Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-21792 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104942
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21792
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_setsockopt() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 6.1 - 6.13.3
CPE2.3https://git.kernel.org/stable/c/470bda72fda0fcf54300466d70ce2de62f7835d2
https://git.kernel.org/stable/c/90056ece99966182dc0e367f3fd2afab46ada847
https://git.kernel.org/stable/c/94a0de224ed52eb2ecd4f4cb1b937b674c9fb955
https://git.kernel.org/stable/c/b58f7ca86a7b8e480c06e30c5163c5d2f4e24023
https://git.kernel.org/stable/c/bca0902e61731a75fc4860c8720168d9f1bae3b6
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.129
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.16
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.4
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.79
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.