{"id":"CVE-2025-21761","summary":"openvswitch: use RCU protection in ovs_vport_cmd_fill_info()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: use RCU protection in ovs_vport_cmd_fill_info()\n\novs_vport_cmd_fill_info() can be called without RTNL or RCU.\n\nUse RCU protection and dev_net_rcu() to avoid potential UAF.","modified":"2026-04-02T12:45:12.518632Z","published":"2025-02-27T02:18:14.054Z","related":["ALSA-2025:20095","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7521-2"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21761.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5828937742af74666192835d657095d95c53dbd0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e01abc34e87abd091e619161a20f54ed4e3e2da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ec57509c36c8b9a23e50b7858dda0c520a2d074"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a849a10de5e04d798f7f286a2f1ca174719a617a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a8816b3f1f151373fd30f1996f00480126c8bb11"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a884f57600e463f69d7b279c4598b865260b62a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e85a25d1a9985645e796039e843d1de581d2de1e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21761.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21761"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9354d452034273a50a4fd703bea31e5d6b1fc20b"},{"fixed":"e85a25d1a9985645e796039e843d1de581d2de1e"},{"fixed":"a8816b3f1f151373fd30f1996f00480126c8bb11"},{"fixed":"a884f57600e463f69d7b279c4598b865260b62a1"},{"fixed":"7e01abc34e87abd091e619161a20f54ed4e3e2da"},{"fixed":"8ec57509c36c8b9a23e50b7858dda0c520a2d074"},{"fixed":"a849a10de5e04d798f7f286a2f1ca174719a617a"},{"fixed":"5828937742af74666192835d657095d95c53dbd0"},{"fixed":"90b2f49a502fa71090d9f4fe29a2f51fe5dff76d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21761.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}