{"uuid": "33fc4b88-6875-42f8-9b08-57afb49bd830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21659", "type": "seen", "source": "https://t.me/cvedetector/15942", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21659 - Apache Netlink NAPI Namespace Violation\", \n  \"Content\": \"CVE ID : CVE-2025-21659 \nPublished : Jan. 21, 2025, 1:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetdev: prevent accessing NAPI instances from another namespace  \n  \nThe NAPI IDs were not fully exposed to user space prior to the netlink  \nAPI, so they were never namespaced. The netlink API must ensure that  \nat the very least NAPI instance belongs to the same netns as the owner  \nof the genl sock.  \n  \nnapi_by_id() can become static now, but it needs to move because of  \ndev_get_by_napi_id(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T15:17:23.000000Z"}