CVE-2025-21759
ipv6: mcast: extend RCU protection in igmp6_send()
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 0bf8e2f3768629d437a32cb824149e6e98254381 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 8e92d6a413feaf968a33f0b439ecf27404407458 b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 < 087c1faa594fa07a66933d750c0b2610aa1a2946
Linux / Linux
2.6.26
References
git.kernel.org: https://git.kernel.org/stable/c/81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a git.kernel.org: https://git.kernel.org/stable/c/0bf8e2f3768629d437a32cb824149e6e98254381 git.kernel.org: https://git.kernel.org/stable/c/8e92d6a413feaf968a33f0b439ecf27404407458 git.kernel.org: https://git.kernel.org/stable/c/087c1faa594fa07a66933d750c0b2610aa1a2946