Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-21758
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2025 | 02:18
Updated At-03 Nov, 2025 | 19:37
Rejected At-
▼CVE Numbering Authority (CNA)
ipv6: mcast: add RCU protection to mld_newpack()

In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ipv6/mcast.c
Default Status
unaffected
Versions
Affected
  • From b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 before 29fa42197f26a97cde29fa8c40beddf44ea5c8f3 (git)
  • From b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 before e8af3632a7f2da83e27b083f787bced1faba00b1 (git)
  • From b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 before 1b91c597b0214b1b462eb627ec02658c944623f2 (git)
  • From b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 before 25195f9d5ffcc8079ad743a50c0409dbdc48d98a (git)
  • From b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 before d60d493b0e65647e0335e6a7c4547abcea7df8e9 (git)
  • From b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 before a527750d877fd334de87eef81f1cb5f0f0ca3373 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ipv6/mcast.c
Default Status
affected
Versions
Affected
  • 2.6.26
Unaffected
  • From 0 before 2.6.26 (semver)
  • From 5.15.179 through 5.15.* (semver)
  • From 6.1.129 through 6.1.* (semver)
  • From 6.6.79 through 6.6.* (semver)
  • From 6.12.16 through 6.12.* (semver)
  • From 6.13.4 through 6.13.* (semver)
  • From 6.14 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3
N/A
https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1
N/A
https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2
N/A
https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a
N/A
https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9
N/A
https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373
N/A
Hyperlink: https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
Resource: N/A
Details not found