CVE-2025-21791

In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_out() Add rcu_read_lock() / rcu_read_unlock() pair to avoid a potential UAF.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

13 Mar 2025, 21:53

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/022cac1c693add610ae76ede03adf4d9d5a2cf21 - () https://git.kernel.org/stable/c/022cac1c693add610ae76ede03adf4d9d5a2cf21 - Patch
References () https://git.kernel.org/stable/c/20a3489b396764cc9376e32a9172bee26a89dc3b - () https://git.kernel.org/stable/c/20a3489b396764cc9376e32a9172bee26a89dc3b - Patch
References () https://git.kernel.org/stable/c/5bb4228c32261d06e4fbece37ec3828bcc005b6b - () https://git.kernel.org/stable/c/5bb4228c32261d06e4fbece37ec3828bcc005b6b - Patch
References () https://git.kernel.org/stable/c/6ccaa5797f5362a2aad6baa6ddaf4715ac2dd51e - () https://git.kernel.org/stable/c/6ccaa5797f5362a2aad6baa6ddaf4715ac2dd51e - Patch
References () https://git.kernel.org/stable/c/6d0ce46a93135d96b7fa075a94a88fe0da8e8773 - () https://git.kernel.org/stable/c/6d0ce46a93135d96b7fa075a94a88fe0da8e8773 - Patch
References () https://git.kernel.org/stable/c/7b81425b517accefd46bee854d94954f5c57e019 - () https://git.kernel.org/stable/c/7b81425b517accefd46bee854d94954f5c57e019 - Patch
References () https://git.kernel.org/stable/c/c40cb5c03e37552d6eff963187109e2c3f78ef6f - () https://git.kernel.org/stable/c/c40cb5c03e37552d6eff963187109e2c3f78ef6f - Patch
References () https://git.kernel.org/stable/c/c7574740be8ce68a57d0aece24987b9be2114c3c - () https://git.kernel.org/stable/c/c7574740be8ce68a57d0aece24987b9be2114c3c - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vrf: usar protección RCU en l3mdev_l3_out() l3mdev_l3_out() se puede llamar sin que se retenga RCU: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_out() Agregue el par rcu_read_lock() / rcu_read_unlock() para evitar un posible UAF.
References
  • () https://git.kernel.org/stable/c/20a3489b396764cc9376e32a9172bee26a89dc3b -
  • () https://git.kernel.org/stable/c/5bb4228c32261d06e4fbece37ec3828bcc005b6b -
  • () https://git.kernel.org/stable/c/6ccaa5797f5362a2aad6baa6ddaf4715ac2dd51e -

27 Feb 2025, 18:15

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-03-13 21:53


NVD link : CVE-2025-21791

Mitre link : CVE-2025-21791

CVE.ORG link : CVE-2025-21791


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free