CVE-2025-21758
ipv6: mcast: add RCU protection to mld_newpack()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 29fa42197f26a97cde29fa8c40beddf44ea5c8f3 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < e8af3632a7f2da83e27b083f787bced1faba00b1 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 1b91c597b0214b1b462eb627ec02658c944623f2 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 25195f9d5ffcc8079ad743a50c0409dbdc48d98a b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < d60d493b0e65647e0335e6a7c4547abcea7df8e9 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < a527750d877fd334de87eef81f1cb5f0f0ca3373
Linux / Linux
2.6.26
References
git.kernel.org: https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3 git.kernel.org: https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1 git.kernel.org: https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2 git.kernel.org: https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a git.kernel.org: https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9 git.kernel.org: https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html