CVE-2025-21759
27.02.2025, 03:15
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 2.6.26 ≤ 𝑥 < 6.6.79 |
linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.16 |
linux | linux_kernel | 6.13 ≤ 𝑥 < 6.13.4 |
linux | linux_kernel | 6.14:rc1 |
linux | linux_kernel | 6.14:rc2 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure