CVE-2025-21762

Source
https://cve.org/CVERecord?id=CVE-2025-21762
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21762.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21762
Downstream
Related
Published
2025-02-27T02:18:14.600Z
Modified
2026-03-20T12:41:09.708795Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
arp: use RCU protection in arp_xmit()
Details

In the Linux kernel, the following vulnerability has been resolved:

arp: use RCU protection in arp_xmit()

arp_xmit() can be called without RTNL or RCU protection.

Use RCU protection to avoid potential UAF.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21762.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
29a26a56803855a79dbd028cd61abee56237d6e5
Fixed
10f555e3f573d004ae9d89b3276abb58c4ede5c3
Fixed
307cd1e2d3cb1cbc6c40c679cada6d7168b18431
Fixed
d9366ac2f956a1948b68c0500f84a3462ff2ed8a
Fixed
f189654459423d4d48bef2d120b4bfba559e6039
Fixed
e9f4dee534eb1b225b0a120395ad9bc2afe164d3
Fixed
01d1b5c9abcaff29a43f1d17a19c33eec92c7dbe
Fixed
2c331718d3389b6c5f6855078ab7171849e016bd
Fixed
a42b69f692165ec39db42d595f4f65a4c8f42e44

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21762.json"