In the Linux kernel, the following vulnerability has been resolved:
ndisc: extend RCU protection in ndiscsendskb()
ndiscsendskb() can be called without RTNL or RCU held.
Acquire rcureadlock() earlier, so that we can use devnetrcu() and avoid a potential UAF.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21760.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"92704719033589932073121126669401193527",
"91705581587732406237971189056543814064",
"286215732563393082367528135117961724748",
"52464476732372974305280276640637255633",
"172779224228578519252714267120353132257",
"107344654512987934065825667585845890096",
"222019344717275179830993695893818174265",
"60858007751910616237844959679858783436",
"27303081734719375381189355286955147651",
"121106564181262162844482784221614966274",
"115736234834547679233383940921867161437",
"21794028687397958872448557483754098549",
"270201101337749717145191568892532161392",
"43490454032298481857407627579291791337",
"120912119307711954578172786152689207434",
"281025681808902813269355181890971685136",
"240996030922917551950691123651554108889",
"299828567871155221476922640403014913776",
"100949278056808622662605180316397468645",
"88643764725483383704103927423403277638"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2025-21760-0689ced8",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04e05112f10354ffc3bb6cc796d553bab161594c",
"target": {
"file": "net/ipv6/ndisc.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "314155464888231111768162190775222123150",
"length": 1074.0
},
"id": "CVE-2025-21760-8972e5f6",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04e05112f10354ffc3bb6cc796d553bab161594c",
"target": {
"file": "net/ipv6/ndisc.c",
"function": "ndisc_send_skb"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21760.json"