CVE-2025-21760

Source
https://cve.org/CVERecord?id=CVE-2025-21760
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21760.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21760
Downstream
Related
Published
2025-02-27T02:18:13.496Z
Modified
2026-03-12T02:15:22.899479Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ndisc: extend RCU protection in ndisc_send_skb()
Details

In the Linux kernel, the following vulnerability has been resolved:

ndisc: extend RCU protection in ndiscsendskb()

ndiscsendskb() can be called without RTNL or RCU held.

Acquire rcureadlock() earlier, so that we can use devnetrcu() and avoid a potential UAF.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21760.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1762f7e88eb34f653b4a915be99a102e347dd45e
Fixed
10a1f3fece2f0d23a3a618b72b2b4e6f408ef7d1
Fixed
4d576202b90b1b95a7c428a80b536f91b8201bcc
Fixed
e24d225e4cb8cf108bde00b76594499b98f0a74d
Fixed
a9319d800b5701e7f5e3fa71a5b7c4831fc20d6d
Fixed
ae38982f521621c216fc2f5182cd091f4734641d
Fixed
789230e5a8c1097301afc802e242c79bc8835c67
Fixed
04e05112f10354ffc3bb6cc796d553bab161594c
Fixed
ed6ae1f325d3c43966ec1b62ac1459e2b8e45640

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21760.json"