SB2025022860 - Improper locking in Linux kernel rxrpc
Published: February 28, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper locking (CVE-ID: CVE-2025-21809)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rxrpc_new_incoming_peer(), rxrpc_lookup_peer() and __rxrpc_put_peer() functions in net/rxrpc/peer_object.c, within the rxrpc_peer_keepalive_dispatch() and rxrpc_peer_keepalive_worker() functions in net/rxrpc/peer_event.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0e77dd41689637ac4e1b8fe0f27541f373640855
- https://git.kernel.org/stable/c/10ba5a3d57af20e494e0d979d1894260989235dd
- https://git.kernel.org/stable/c/79d458c13056559d49b5e41fbc4b6890e68cf65b
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14