In the Linux kernel, the following vulnerability has been resolved:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
ovs_vport_cmd_fill_info() can be called without RTNL or RCU.
Use RCU protection and dev_net_rcu() to avoid potential UAF.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-27 03:15
Updated : 2025-11-03 20:17
NVD link : CVE-2025-21761
Mitre link : CVE-2025-21761
CVE.ORG link : CVE-2025-21761
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
