CVE-2025-21758
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipv6: mcast: add RCU protection to mld_newpack()<br />
<br />
mld_newpack() can be called without RTNL or RCU being held.<br />
<br />
Note that we no longer can use sock_alloc_send_skb() because<br />
ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.<br />
<br />
Instead use alloc_skb() and charge the net->ipv6.igmp_sk<br />
socket under RCU protection.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.26 (including) | 5.15.179 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.79 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2
- https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a
- https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3
- https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373
- https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9
- https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html



