๐Ÿ” CVE Alert

CVE-2025-21758

UNKNOWN 0.0

ipv6: mcast: add RCU protection to mld_newpack()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 29fa42197f26a97cde29fa8c40beddf44ea5c8f3 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < e8af3632a7f2da83e27b083f787bced1faba00b1 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 1b91c597b0214b1b462eb627ec02658c944623f2 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 25195f9d5ffcc8079ad743a50c0409dbdc48d98a b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < d60d493b0e65647e0335e6a7c4547abcea7df8e9 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < a527750d877fd334de87eef81f1cb5f0f0ca3373
Linux / Linux
2.6.26

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3 git.kernel.org: https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1 git.kernel.org: https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2 git.kernel.org: https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a git.kernel.org: https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9 git.kernel.org: https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html