
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability has been identified in the IPv6 networking stack where the ip6defaultadvmss() function lacks proper RCU (Read-Copy-Update) protection. This vulnerability was discovered in February 2025 and affects the Linux kernel's networking subsystem. The issue stems from insufficient protection when reading network structure data, which could potentially lead to memory safety issues (Kernel Commit).
The vulnerability exists in the ip6defaultadvmss() function within the IPv6 routing code. The function needs RCU protection to ensure that the network structure it reads does not disappear during access. This issue was introduced by an earlier commit '[NETNS][IPV6] route6 - make route6 per namespace' (5578689a4e3c). The fix involves adding proper RCU read lock protection around the network structure access using rcureadlock() and rcureadunlock() calls, and replacing devnet() with devnet_rcu() (Kernel Commit).
The vulnerability could potentially lead to memory safety issues and system instability when handling IPv6 networking operations. Since the affected function is part of the core networking stack, it could impact systems that utilize IPv6 networking capabilities (NVD).
The issue has been fixed in the Linux kernel through a patch that adds proper RCU protection. System administrators should update their kernel to a version that includes this fix. The patch has been merged into the mainline kernel and is being backported to stable kernel versions (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."