CVE-2025-21758

Source
https://cve.org/CVERecord?id=CVE-2025-21758
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21758.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21758
Downstream
Related
Published
2025-02-27T02:18:12.496Z
Modified
2026-03-20T12:41:09.228961Z
Summary
ipv6: mcast: add RCU protection to mld_newpack()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: add RCU protection to mld_newpack()

mld_newpack() can be called without RTNL or RCU being held.

Note that we no longer can use sockallocsendskb() because ipv6.igmpsk uses GFP_KERNEL allocations which can sleep.

Instead use allocskb() and charge the net->ipv6.igmpsk socket under RCU protection.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21758.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551
Fixed
29fa42197f26a97cde29fa8c40beddf44ea5c8f3
Fixed
e8af3632a7f2da83e27b083f787bced1faba00b1
Fixed
1b91c597b0214b1b462eb627ec02658c944623f2
Fixed
25195f9d5ffcc8079ad743a50c0409dbdc48d98a
Fixed
d60d493b0e65647e0335e6a7c4547abcea7df8e9
Fixed
a527750d877fd334de87eef81f1cb5f0f0ca3373

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21758.json"