CVE-2025-21765

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21765
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21765.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21765
Downstream
Related
Published
2025-02-27T02:18:16.078Z
Modified
2025-11-28T02:34:54.858525Z
Summary
ipv6: use RCU protection in ip6_default_advmss()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU protection in ip6defaultadvmss()

ip6defaultadvmss() needs rcu protection to make sure the net structure it reads does not disappear.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21765.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5578689a4e3c04f2d43ea39736fd3fa396d80c6e
Fixed
78ad057472d8c76e0602402269222f9f9c698790
Fixed
d02f30d220ef9511568a48dba8a9004c65f8d904
Fixed
28de355b63ad42309ed5a03ee7c436c90512265b
Fixed
84212387caadb211cd9dadd6fd5563bd37dc1f5e
Fixed
4176a68b0db8fc74ac14fcd00ba8231371051dc2
Fixed
713a40c892f40300d63691d9f85b2a23b48fe1e8
Fixed
550ed693f47370502a71b85382e7f9e6417300b8
Fixed
3c8ffcd248da34fc41e52a46e51505900115fc2a

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.26
Fixed
5.4.291
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.235
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.129
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.79
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.16
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.4