CVE-2025-21759
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
27/02/2025
Last modified:
24/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipv6: mcast: extend RCU protection in igmp6_send()<br />
<br />
igmp6_send() can be called without RTNL or RCU being held.<br />
<br />
Extend RCU protection so that we can safely fetch the net pointer<br />
and avoid a potential UAF.<br />
<br />
Note that we no longer can use sock_alloc_send_skb() because<br />
ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.<br />
<br />
Instead use alloc_skb() and charge the net->ipv6.igmp_sk<br />
socket under RCU protection.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.26 (including) | 6.6.79 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.16 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page