First published: Thu Feb 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_out() Add rcu_read_lock() / rcu_read_unlock() pair to avoid a potential UAF.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.9<6.1.129 | |
Linux Kernel | >=6.2<6.6.79 | |
Linux Kernel | >=6.7<6.12.16 | |
Linux Kernel | >=6.13<6.13.4 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21791 has a severity rating that reflects its potential impact on system stability and security.
CVE-2025-21791 affects the Linux kernel, particularly in functions related to routing traffic.
To fix CVE-2025-21791, update the Linux kernel to the latest version that includes the patch.
CVE-2025-21791 involves inadequate protection when calling l3mdev_l3_out() in the Linux kernel.
There is no widely recommended workaround for CVE-2025-21791; updating the kernel is the best approach.