#VU104948 Use-after-free in Linux kernel - CVE-2025-21761


| Updated: 2025-05-11

Vulnerability identifier: #VU104948

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21761

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ovs_vport_cmd_fill_info() function in net/openvswitch/datapath.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 6.12, 6.12.1, 6.12.2, 6.12.3, 6.12.4, 6.12.5, 6.12.6, 6.12.7, 6.12.8, 6.12.9, 6.12.10, 6.12.11, 6.12.12, 6.12.13, 6.12.14, 6.12.15


External links
https://git.kernel.org/stable/c/5828937742af74666192835d657095d95c53dbd0
https://git.kernel.org/stable/c/7e01abc34e87abd091e619161a20f54ed4e3e2da
https://git.kernel.org/stable/c/8ec57509c36c8b9a23e50b7858dda0c520a2d074
https://git.kernel.org/stable/c/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d
https://git.kernel.org/stable/c/a849a10de5e04d798f7f286a2f1ca174719a617a
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.16


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability