#VU106132 Resource management error in Linux kernel - CVE-2025-21877


Vulnerability identifier: #VU106132

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21877

CWE-ID: CWE-399

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the genelink_bind() function in drivers/net/usb/gl620a.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/1cf9631d836b289bd5490776551961c883ae8a4f
https://git.kernel.org/stable/c/24dd971104057c8828d420a48e0a5af6e6f30d3e
https://git.kernel.org/stable/c/4e8b8d43373bf837be159366f0192502f97ec7a5
https://git.kernel.org/stable/c/5f2dbabbce04b1ffcd6d8d07564adb94db577536
https://git.kernel.org/stable/c/67ebc3391c8377738e97a43374054d9718fdb6e4
https://git.kernel.org/stable/c/9bcb8cbc3e5d67eb223bfb7e2291a270dbb699dc
https://git.kernel.org/stable/c/a2ee5e55b50a97d13617c8653482c0ad4decff8c
https://git.kernel.org/stable/c/ded25730c96949cb8b048b29c557e38569124943


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability