- Description
 - In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix panic during interface removal Reference counting is used to ensure that batadv_hardif_neigh_node and batadv_hard_iface are not freed before/during batadv_v_elp_throughput_metric_update work is finished. But there isn't a guarantee that the hard if will remain associated with a soft interface up until the work is finished. This fixes a crash triggered by reboot that looks like this: Call trace: batadv_v_mesh_free+0xd0/0x4dc [batman_adv] batadv_v_elp_throughput_metric_update+0x1c/0xa4 process_one_work+0x178/0x398 worker_thread+0x2e8/0x4d0 kthread+0xd8/0xdc ret_from_fork+0x10/0x20 (the batadv_v_mesh_free call is misleading, and does not actually happen) I was able to make the issue happen more reliably by changing hardif_neigh->bat_v.metric_work work to be delayed work. This allowed me to track down and confirm the fix. [sven@narfation.org: prevent entering batadv_v_elp_get_throughput without soft_iface]
 - Source
 - 416baaa9-dc9f-4396-8d5f-8c081fb06d67
 - NVD status
 - Modified
 - Products
 - linux_kernel
 
CVSS 3.1
- Type
 - Primary
 - Base score
 - 5.5
 - Impact score
 - 3.6
 - Exploitability score
 - 1.8
 - Vector string
 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
 - Severity
 - MEDIUM
 
- Hype score
 - Not currently trending
 
CVE-2025-21781 In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix panic during interface removal Reference counting is used to ensure that batadv_… https://t.co/fx7AZD54pP
@CVEnew
27 Feb 2025
318 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-21781 In the Linux kernel, the following vulnerability has been resolved: batman-adv https://t.co/o1156EzFb3
@VulmonFeeds
27 Feb 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "12DA8BBB-38CB-4CD1-897F-7B5EA22A779B",
            "versionEndExcluding": "5.4.291",
            "versionStartIncluding": "4.6"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "545121FA-DE31-4154-9446-C2000FB4104D",
            "versionEndExcluding": "5.10.235",
            "versionStartIncluding": "5.5"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "C708062C-4E1B-465F-AE6D-C09C46400875",
            "versionEndExcluding": "5.15.179",
            "versionStartIncluding": "5.11"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C",
            "versionEndExcluding": "6.1.129",
            "versionStartIncluding": "5.16"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775",
            "versionEndExcluding": "6.6.79",
            "versionStartIncluding": "6.2"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC",
            "versionEndExcluding": "6.12.16",
            "versionStartIncluding": "6.7"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4",
            "versionEndExcluding": "6.13.4",
            "versionStartIncluding": "6.13"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
          }
        ],
        "operator": "OR"
      }
    ]
  }
]