{"uuid": "387d8e37-d759-4300-843d-3a61e1eea760", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21719", "type": "seen", "source": "https://t.me/cvedetector/18994", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21719 - Linux Kernel IPMR Unres Entries Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21719 \nPublished : Feb. 27, 2025, 2:15 a.m. | 50\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nipmr: do not call mr_mfc_uses_dev() for unres entries  \n  \nsyzbot found that calling mr_mfc_uses_dev() for unres entries  \nwould crash [1], because c-&gt;mfc_un.res.minvif / c-&gt;mfc_un.res.maxvif  \nalias to \"struct sk_buff_head unresolved\", which contain two pointers.  \n  \nThis code never worked, lets remove it.  \n  \n[1]  \nUnable to handle kernel paging request at virtual address ffff5fff2d536613  \nKASAN: maybe wild-memory-access in range [0xfffefff96a9b3098-0xfffefff96a9b309f]  \nModules linked in:  \nCPU: 1 UID: 0 PID: 7321 Comm: syz.0.16 Not tainted 6.13.0-rc7-syzkaller-g1950a0af2d55 #0  \nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024  \npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)  \n pc : mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline]  \n pc : mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334  \n lr : mr_mfc_uses_dev net/ipv4/ipmr_base.c:289 [inline]  \n lr : mr_table_dump+0x694/0x8b0 net/ipv4/ipmr_base.c:334  \nCall trace:  \n  mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline] (P)  \n  mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334 (P)  \n  mr_rtm_dumproute+0x254/0x454 net/ipv4/ipmr_base.c:382  \n  ipmr_rtm_dumproute+0x248/0x4b4 net/ipv4/ipmr.c:2648  \n  rtnl_dump_all+0x2e4/0x4e8 net/core/rtnetlink.c:4327  \n  rtnl_dumpit+0x98/0x1d0 net/core/rtnetlink.c:6791  \n  netlink_dump+0x4f0/0xbc0 net/netlink/af_netlink.c:2317  \n  netlink_recvmsg+0x56c/0xe64 net/netlink/af_netlink.c:1973  \n  sock_recvmsg_nosec net/socket.c:1033 [inline]  \n  sock_recvmsg net/socket.c:1055 [inline]  \n  sock_read_iter+0x2d8/0x40c net/socket.c:1125  \n  new_sync_read fs/read_write.c:484 [inline]  \n  vfs_read+0x740/0x970 fs/read_write.c:565  \n  ksys_read+0x15c/0x26c fs/read_write.c:708 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T04:30:32.000000Z"}