CVE-2025-21791

high

Description

In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_out() Add rcu_read_lock() / rcu_read_unlock() pair to avoid a potential UAF.

References

https://git.kernel.org/stable/c/c7574740be8ce68a57d0aece24987b9be2114c3c

https://git.kernel.org/stable/c/c40cb5c03e37552d6eff963187109e2c3f78ef6f

https://git.kernel.org/stable/c/7b81425b517accefd46bee854d94954f5c57e019

https://git.kernel.org/stable/c/6d0ce46a93135d96b7fa075a94a88fe0da8e8773

https://git.kernel.org/stable/c/022cac1c693add610ae76ede03adf4d9d5a2cf21

Details

Source: Mitre, NVD

Published: 2025-02-27

Updated: 2025-02-27

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High