{"id":"CVE-2025-21766","summary":"ipv4: use RCU protection in __ip_rt_update_pmtu()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: use RCU protection in __ip_rt_update_pmtu()\n\n__ip_rt_update_pmtu() must use RCU protection to make\nsure the net structure it reads does not disappear.","modified":"2026-03-31T17:29:25.747432Z","published":"2025-02-27T02:18:16.570Z","related":["SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:1293-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","SUSE-SU-2026:0474-1","SUSE-SU-2026:0475-1","SUSE-SU-2026:0495-1","SUSE-SU-2026:0496-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:1131-1","USN-7521-2"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21766.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/139512191bd06f1b496117c76372b2ce372c9a41"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4583748b65dee4d61bd50a2214715b4237bc152a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9b1766d1ff5fe496aabe9fc5f4e34e53f35c11c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a39f61d212d822b3062d7f70fa0588e50e55664e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ce3c6165fce0f06305c806696882a3ad4b90e33f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea07480b23225942208f1b754fea1e7ec486d37e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21766.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21766"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2fbc6e89b2f1403189e624cabaf73e189c5e50c6"},{"fixed":"ce3c6165fce0f06305c806696882a3ad4b90e33f"},{"fixed":"ea07480b23225942208f1b754fea1e7ec486d37e"},{"fixed":"9b1766d1ff5fe496aabe9fc5f4e34e53f35c11c4"},{"fixed":"4583748b65dee4d61bd50a2214715b4237bc152a"},{"fixed":"a39f61d212d822b3062d7f70fa0588e50e55664e"},{"fixed":"139512191bd06f1b496117c76372b2ce372c9a41"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"f415c264176e6095e9dee823e09c5bdd0ee0d337"},{"last_affected":"98776a365da509ad923083ae54b38ee521c52742"},{"last_affected":"860e2cc78c697c95bc749abb20047239fa1722ea"},{"last_affected":"2b1be6c925cdf4638811765a9160796291494b89"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21766.json"}}],"schema_version":"1.7.5"}