#VU103590 Improper locking in Linux kernel - CVE-2025-21678


Vulnerability identifier: #VU103590

Vulnerability risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21678

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the gtp_newlink() and gtp_net_exit_batch_rtnl() functions in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/036f8d814a2cd11ee8ef62b8f3e7ce5dec0ee4f3
https://git.kernel.org/stable/c/5f1678346109ff3a6d229d33437fcba3cce9209d
https://git.kernel.org/stable/c/86f73d4ab2f27deeff22ba9336ad103d94f12ac7
https://git.kernel.org/stable/c/bb11f992f5a475bc68ef959f17a55306f0328495
https://git.kernel.org/stable/c/c986380c1d5274c4d5e935addc807d6791cc23eb
https://git.kernel.org/stable/c/eb28fd76c0a08a47b470677c6cef9dd1c60e92d1
https://git.kernel.org/stable/c/efec287cbac92ac6ee8312a89221854760e13b34


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability