CVE-2025-21791Use After Free in Linux

CWE-416Use After Free95 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV7.1OSV5.9OSV5.5
EPSS
0.1%
top 83.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateDec 16

Description

In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_out() Add rcu_read_lock() / rcu_read_unlock() pair to avoid a potential UAF.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

47
OSV
linux-azure-fips vulnerabilities2025-12-16
OSV
linux-azure, linux-azure-4.15, linux-oracle, vulnerabilities2025-12-12
OSV
linux-gcp, linux-gcp-4.15, linux-hwe vulnerabilities2025-12-04
OSV
linux-gcp-fips vulnerabilities2025-12-04
OSV
linux-aws-fips, linux-fips vulnerabilities2025-12-03

📋Vendor Advisories

47
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-12-16
Ubuntu
Linux kernel kernel vulnerabilities2025-12-12
Ubuntu
Linux kernel vulnerabilities2025-12-04
Ubuntu
Linux kernel (GCP FIPS) vulnerabilities2025-12-04
Ubuntu
Linux kernel (FIPS) vulnerabilities2025-12-03
CVE-2025-21791 — Use After Free in Linux | cvebase