blob: 8ffdc0f537e6d54da7ef5f349731fbd07c35f318 [file] [log] [blame]
From bippy-5f407fcff5a0 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
neighbour: use RCU protection in __neigh_notify()
__neigh_notify() can be called without RTNL or RCU protection.
Use RCU protection to avoid potential UAF.
The Linux kernel CVE team has assigned CVE-2025-21763 to this issue.
Affected and fixed versions
===========================
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 5.4.291 with commit e1aed6be381bcd7f46d4ca9d7ef0f5f3d6a1be32
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 5.10.235 with commit 8666e9aab801328c1408a19fbf4070609dc0695a
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 5.15.179 with commit 40d8f2f2a373b6c294ffac394d2bb814b572ead1
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.1.129 with commit 784eb2376270e086f7db136d154b8404edacf97b
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.6.79 with commit 1cbb2aa90cd3fba15ad7efb5cdda28f3d1082379
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.12.16 with commit cdd5c2a12ddad8a77ce1838ff9f29aa587de82df
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.13.4 with commit 559307d25235e24b5424778c7332451b6c741159
Issue introduced in 2.6.25 with commit 426b5303eb435d98b9bee37a807be386bc2b3320 and fixed in 6.14 with commit becbd5850c03ed33b232083dd66c6e38c0c0e569
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-21763
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
net/core/neighbour.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/e1aed6be381bcd7f46d4ca9d7ef0f5f3d6a1be32
https://git.kernel.org/stable/c/8666e9aab801328c1408a19fbf4070609dc0695a
https://git.kernel.org/stable/c/40d8f2f2a373b6c294ffac394d2bb814b572ead1
https://git.kernel.org/stable/c/784eb2376270e086f7db136d154b8404edacf97b
https://git.kernel.org/stable/c/1cbb2aa90cd3fba15ad7efb5cdda28f3d1082379
https://git.kernel.org/stable/c/cdd5c2a12ddad8a77ce1838ff9f29aa587de82df
https://git.kernel.org/stable/c/559307d25235e24b5424778c7332451b6c741159
https://git.kernel.org/stable/c/becbd5850c03ed33b232083dd66c6e38c0c0e569