CVE-2025-21761Use After Free in Linux

CWE-416Use After Free95 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV7.1OSV5.9OSV5.5
EPSS
0.1%
top 84.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateDec 16

Description

In the Linux kernel, the following vulnerability has been resolved: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() ovs_vport_cmd_fill_info() can be called without RTNL or RCU. Use RCU protection and dev_net_rcu() to avoid potential UAF.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

47
OSV
linux-azure-fips vulnerabilities2025-12-16
OSV
linux-azure, linux-azure-4.15, linux-oracle, vulnerabilities2025-12-12
OSV
linux-gcp, linux-gcp-4.15, linux-hwe vulnerabilities2025-12-04
OSV
linux-gcp-fips vulnerabilities2025-12-04
OSV
linux-aws-fips, linux-fips vulnerabilities2025-12-03

📋Vendor Advisories

47
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-12-16
Ubuntu
Linux kernel kernel vulnerabilities2025-12-12
Ubuntu
Linux kernel vulnerabilities2025-12-04
Ubuntu
Linux kernel (GCP FIPS) vulnerabilities2025-12-04
Ubuntu
Linux kernel (FIPS) vulnerabilities2025-12-03