CVE-2025-21791
Published: February 28, 2025Last modified: February 28, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_out() Add rcu_read_lock() / rcu_read_unlock() pair to avoid a potential UAF.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.130-r0) |
Stream | linux-lts | Fixed (6.6.82-r0) |
References
- https://git.kernel.org/stable/c/022cac1c693add610ae76ede03adf4d9d5a2cf21
- https://git.kernel.org/stable/c/20a3489b396764cc9376e32a9172bee26a89dc3b
- https://git.kernel.org/stable/c/5bb4228c32261d06e4fbece37ec3828bcc005b6b
- https://git.kernel.org/stable/c/6ccaa5797f5362a2aad6baa6ddaf4715ac2dd51e
- https://git.kernel.org/stable/c/6d0ce46a93135d96b7fa075a94a88fe0da8e8773
- https://git.kernel.org/stable/c/7b81425b517accefd46bee854d94954f5c57e019
- https://git.kernel.org/stable/c/c40cb5c03e37552d6eff963187109e2c3f78ef6f
- https://git.kernel.org/stable/c/c7574740be8ce68a57d0aece24987b9be2114c3c