[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025022604-CVE-2025-21763-dcff@gregkh>
Date: Wed, 26 Feb 2025 18:17:19 -0800
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
neighbour: use RCU protection in __neigh_notify()
__neigh_notify() can be called without RTNL or RCU protection.
Use RCU protection to avoid potential UAF.
The Linux kernel CVE team has assigned CVE-2025-21763 to this issue.
Affected and fixed versions
===========================
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.1.129 with commit 784eb2376270e086f7db136d154b8404edacf97b
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.6.79 with commit 1cbb2aa90cd3fba15ad7efb5cdda28f3d1082379
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.12.16 with commit cdd5c2a12ddad8a77ce1838ff9f29aa587de82df
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.13.4 with commit 559307d25235e24b5424778c7332451b6c741159
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.14-rc3 with commit becbd5850c03ed33b232083dd66c6e38c0c0e569
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-21763
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
net/core/neighbour.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/784eb2376270e086f7db136d154b8404edacf97b
https://git.kernel.org/stable/c/1cbb2aa90cd3fba15ad7efb5cdda28f3d1082379
https://git.kernel.org/stable/c/cdd5c2a12ddad8a77ce1838ff9f29aa587de82df
https://git.kernel.org/stable/c/559307d25235e24b5424778c7332451b6c741159
https://git.kernel.org/stable/c/becbd5850c03ed33b232083dd66c6e38c0c0e569
Powered by blists - more mailing lists