{"id":"CVE-2025-21760","summary":"ndisc: extend RCU protection in ndisc_send_skb()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nndisc: extend RCU protection in ndisc_send_skb()\n\nndisc_send_skb() can be called without RTNL or RCU held.\n\nAcquire rcu_read_lock() earlier, so that we can use dev_net_rcu()\nand avoid a potential UAF.","modified":"2026-04-02T12:45:12.264023Z","published":"2025-02-27T02:18:13.496Z","related":["SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:1293-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","SUSE-SU-2026:0474-1","SUSE-SU-2026:0475-1","SUSE-SU-2026:0495-1","SUSE-SU-2026:0496-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:1131-1","USN-7521-2"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21760.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/04e05112f10354ffc3bb6cc796d553bab161594c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/10a1f3fece2f0d23a3a618b72b2b4e6f408ef7d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d576202b90b1b95a7c428a80b536f91b8201bcc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/789230e5a8c1097301afc802e242c79bc8835c67"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9319d800b5701e7f5e3fa71a5b7c4831fc20d6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae38982f521621c216fc2f5182cd091f4734641d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e24d225e4cb8cf108bde00b76594499b98f0a74d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed6ae1f325d3c43966ec1b62ac1459e2b8e45640"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21760.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21760"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1762f7e88eb34f653b4a915be99a102e347dd45e"},{"fixed":"10a1f3fece2f0d23a3a618b72b2b4e6f408ef7d1"},{"fixed":"4d576202b90b1b95a7c428a80b536f91b8201bcc"},{"fixed":"e24d225e4cb8cf108bde00b76594499b98f0a74d"},{"fixed":"a9319d800b5701e7f5e3fa71a5b7c4831fc20d6d"},{"fixed":"ae38982f521621c216fc2f5182cd091f4734641d"},{"fixed":"789230e5a8c1097301afc802e242c79bc8835c67"},{"fixed":"04e05112f10354ffc3bb6cc796d553bab161594c"},{"fixed":"ed6ae1f325d3c43966ec1b62ac1459e2b8e45640"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21760.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}