Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-21762

Опубликовано: 27 фев. 2025
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.12.16-1package
linuxfixed6.1.129-1bookwormpackage

Примечания

  • https://git.kernel.org/linus/a42b69f692165ec39db42d595f4f65a4c8f42e44 (6.14-rc3)

EPSS

Процентиль: 11%
0.00037
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.

CVSS3: 7.1
redhat
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.

CVSS3: 7.8
nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.

CVSS3: 7.8
msrc
12 месяцев назад

arp: use RCU protection in arp_xmit()

CVSS3: 7.8
github
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.

EPSS

Процентиль: 11%
0.00037
Низкий