Linux Kernel Vulnerability in NDIS: Potential Unintentional Access Issues
CVE-2025-21760
Summary
A vulnerability has been identified in the Linux kernel's NDIS subsystem where the ndisc_send_skb() function can be invoked without proper Real-Time Networking Layer (RTNL) or Read-Copy-Update (RCU) protections. This oversight may lead to unintended memory access, specifically a potential Use After Free (UAF) condition. The issue has been mitigated by adjusting the placement of the rcu_read_lock() to ensure it is acquired earlier, thereby enabling safer usage of the dev_net_rcu() function and reducing the risk of memory corruption or unauthorized access.
Affected Version(s)
Linux 1762f7e88eb34f653b4a915be99a102e347dd45e
Linux 1762f7e88eb34f653b4a915be99a102e347dd45e
Linux 1762f7e88eb34f653b4a915be99a102e347dd45e < 789230e5a8c1097301afc802e242c79bc8835c67
References
Timeline
Vulnerability published
Vulnerability Reserved