Metrics
Affected Vendors & Products
Sat, 03 May 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 30 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-401 | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 28 Feb 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Feb 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels Some lwtunnels have a dst cache for post-transformation dst. If the packet destination did not change we may end up recording a reference to the lwtunnel in its own cache, and the lwtunnel state will never be freed. Discovered by the ioam6.sh test, kmemleak was recently fixed to catch per-cpu memory leaks. I'm not sure if rpl and seg6 can actually hit this, but in principle I don't see why not. | |
| Title | net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-02-27T02:18:17.553Z
Updated: 2025-05-04T07:20:42.186Z
Reserved: 2024-12-29T08:45:45.762Z
Link: CVE-2025-21768
No data.
Status : Received
Published: 2025-02-27T03:15:17.480
Modified: 2025-02-27T03:15:17.480
Link: CVE-2025-21768