CVE-2025-21760

high

Description

In the Linux kernel, the following vulnerability has been resolved: ndisc: extend RCU protection in ndisc_send_skb() ndisc_send_skb() can be called without RTNL or RCU held. Acquire rcu_read_lock() earlier, so that we can use dev_net_rcu() and avoid a potential UAF.

References

https://git.kernel.org/stable/c/ed6ae1f325d3c43966ec1b62ac1459e2b8e45640

https://git.kernel.org/stable/c/ae38982f521621c216fc2f5182cd091f4734641d

https://git.kernel.org/stable/c/a9319d800b5701e7f5e3fa71a5b7c4831fc20d6d

https://git.kernel.org/stable/c/789230e5a8c1097301afc802e242c79bc8835c67

https://git.kernel.org/stable/c/04e05112f10354ffc3bb6cc796d553bab161594c

Details

Source: Mitre, NVD

Published: 2025-02-27

Updated: 2025-02-27

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High