{"vulnerability": "CVE-2025-21719", "sightings": [{"uuid": "387d8e37-d759-4300-843d-3a61e1eea760", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21719", "type": "seen", "source": "https://t.me/cvedetector/18994", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21719 - Linux Kernel IPMR Unres Entries Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21719 \nPublished : Feb. 27, 2025, 2:15 a.m. | 50\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nipmr: do not call mr_mfc_uses_dev() for unres entries  \n  \nsyzbot found that calling mr_mfc_uses_dev() for unres entries  \nwould crash [1], because c-&gt;mfc_un.res.minvif / c-&gt;mfc_un.res.maxvif  \nalias to \"struct sk_buff_head unresolved\", which contain two pointers.  \n  \nThis code never worked, lets remove it.  \n  \n[1]  \nUnable to handle kernel paging request at virtual address ffff5fff2d536613  \nKASAN: maybe wild-memory-access in range [0xfffefff96a9b3098-0xfffefff96a9b309f]  \nModules linked in:  \nCPU: 1 UID: 0 PID: 7321 Comm: syz.0.16 Not tainted 6.13.0-rc7-syzkaller-g1950a0af2d55 #0  \nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024  \npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)  \n pc : mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline]  \n pc : mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334  \n lr : mr_mfc_uses_dev net/ipv4/ipmr_base.c:289 [inline]  \n lr : mr_table_dump+0x694/0x8b0 net/ipv4/ipmr_base.c:334  \nCall trace:  \n  mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline] (P)  \n  mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334 (P)  \n  mr_rtm_dumproute+0x254/0x454 net/ipv4/ipmr_base.c:382  \n  ipmr_rtm_dumproute+0x248/0x4b4 net/ipv4/ipmr.c:2648  \n  rtnl_dump_all+0x2e4/0x4e8 net/core/rtnetlink.c:4327  \n  rtnl_dumpit+0x98/0x1d0 net/core/rtnetlink.c:6791  \n  netlink_dump+0x4f0/0xbc0 net/netlink/af_netlink.c:2317  \n  netlink_recvmsg+0x56c/0xe64 net/netlink/af_netlink.c:1973  \n  sock_recvmsg_nosec net/socket.c:1033 [inline]  \n  sock_recvmsg net/socket.c:1055 [inline]  \n  sock_read_iter+0x2d8/0x40c net/socket.c:1125  \n  new_sync_read fs/read_write.c:484 [inline]  \n  vfs_read+0x740/0x970 fs/read_write.c:565  \n  ksys_read+0x15c/0x26c fs/read_write.c:708 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T04:30:32.000000Z"}, {"uuid": "4965c0ad-0a8b-4041-87a0-9a80e70f533f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21719", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5640", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21719\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nipmr: do not call mr_mfc_uses_dev() for unres entries\n\nsyzbot found that calling mr_mfc_uses_dev() for unres entries\nwould crash [1], because c-&gt;mfc_un.res.minvif / c-&gt;mfc_un.res.maxvif\nalias to \"struct sk_buff_head unresolved\", which contain two pointers.\n\nThis code never worked, lets remove it.\n\n[1]\nUnable to handle kernel paging request at virtual address ffff5fff2d536613\nKASAN: maybe wild-memory-access in range [0xfffefff96a9b3098-0xfffefff96a9b309f]\nModules linked in:\nCPU: 1 UID: 0 PID: 7321 Comm: syz.0.16 Not tainted 6.13.0-rc7-syzkaller-g1950a0af2d55 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline]\n pc : mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334\n lr : mr_mfc_uses_dev net/ipv4/ipmr_base.c:289 [inline]\n lr : mr_table_dump+0x694/0x8b0 net/ipv4/ipmr_base.c:334\nCall trace:\n  mr_mfc_uses_dev net/ipv4/ipmr_base.c:290 [inline] (P)\n  mr_table_dump+0x5a4/0x8b0 net/ipv4/ipmr_base.c:334 (P)\n  mr_rtm_dumproute+0x254/0x454 net/ipv4/ipmr_base.c:382\n  ipmr_rtm_dumproute+0x248/0x4b4 net/ipv4/ipmr.c:2648\n  rtnl_dump_all+0x2e4/0x4e8 net/core/rtnetlink.c:4327\n  rtnl_dumpit+0x98/0x1d0 net/core/rtnetlink.c:6791\n  netlink_dump+0x4f0/0xbc0 net/netlink/af_netlink.c:2317\n  netlink_recvmsg+0x56c/0xe64 net/netlink/af_netlink.c:1973\n  sock_recvmsg_nosec net/socket.c:1033 [inline]\n  sock_recvmsg net/socket.c:1055 [inline]\n  sock_read_iter+0x2d8/0x40c net/socket.c:1125\n  new_sync_read fs/read_write.c:484 [inline]\n  vfs_read+0x740/0x970 fs/read_write.c:565\n  ksys_read+0x15c/0x26c fs/read_write.c:708\n\ud83d\udccf Published: 2025-02-27T02:07:28.573Z\n\ud83d\udccf Modified: 2025-02-27T02:07:28.573Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/57177c5f47a8da852f8d76cf6945cf803f8bb9e5\n2. https://git.kernel.org/stable/c/b379b3162ff55a70464c6a934ae9bf0497478a62\n3. https://git.kernel.org/stable/c/a099834a51ccf9bbba3de86a251b3433539abfde\n4. https://git.kernel.org/stable/c/26bb7d991f04eeef47dfad23e533834995c26f7a\n5. https://git.kernel.org/stable/c/15a901361ec3fb1c393f91880e1cbf24ec0a88bd", "creation_timestamp": "2025-02-27T02:25:26.000000Z"}, {"uuid": "53156a7e-b51c-4152-b1f7-8fe69703e174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21719", "type": "seen", "source": "MISP/af1fbe07-e10c-40c4-844e-d4419bdf6f80", "content": "", "creation_timestamp": "2025-08-22T13:26:18.000000Z"}]}