CVE-2025-21759

Source
https://cve.org/CVERecord?id=CVE-2025-21759
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21759.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21759
Downstream
Related
Published
2025-02-27T02:18:12.994Z
Modified
2026-03-20T12:41:09.785939Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ipv6: mcast: extend RCU protection in igmp6_send()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: extend RCU protection in igmp6_send()

igmp6_send() can be called without RTNL or RCU being held.

Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF.

Note that we no longer can use sockallocsendskb() because ipv6.igmpsk uses GFP_KERNEL allocations which can sleep.

Instead use allocskb() and charge the net->ipv6.igmpsk socket under RCU protection.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21759.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551
Fixed
81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a
Fixed
0bf8e2f3768629d437a32cb824149e6e98254381
Fixed
8e92d6a413feaf968a33f0b439ecf27404407458
Fixed
087c1faa594fa07a66933d750c0b2610aa1a2946

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21759.json"