CVE-2025-21758

Source
https://cve.org/CVERecord?id=CVE-2025-21758
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21758.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21758
Downstream
Related
Published
2025-02-27T02:18:12.496Z
Modified
2026-05-07T04:16:56.987118Z
Summary
ipv6: mcast: add RCU protection to mld_newpack()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: add RCU protection to mld_newpack()

mld_newpack() can be called without RTNL or RCU being held.

Note that we no longer can use sockallocsendskb() because ipv6.igmpsk uses GFP_KERNEL allocations which can sleep.

Instead use allocskb() and charge the net->ipv6.igmpsk socket under RCU protection.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21758.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551
Fixed
29fa42197f26a97cde29fa8c40beddf44ea5c8f3
Fixed
e8af3632a7f2da83e27b083f787bced1faba00b1
Fixed
1b91c597b0214b1b462eb627ec02658c944623f2
Fixed
25195f9d5ffcc8079ad743a50c0409dbdc48d98a
Fixed
d60d493b0e65647e0335e6a7c4547abcea7df8e9
Fixed
a527750d877fd334de87eef81f1cb5f0f0ca3373

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21758.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.26
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.129
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.79
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.16
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21758.json"