Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-22014 |
CWE-ID | CWE-667 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU107751
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22014
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pdr_locator_new_server() function in drivers/soc/qcom/pdr_interface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 6.12 - 6.12.20
CPE2.3https://git.kernel.org/stable/c/02612f1e4c34d94d6c8ee75bf7d254ed697e22d4
https://git.kernel.org/stable/c/0a566a79aca9851fae140536e0fc5b0853c90a90
https://git.kernel.org/stable/c/2eeb03ad9f42dfece63051be2400af487ddb96d2
https://git.kernel.org/stable/c/72a222b6af10c2a05a5fad0029246229ed8912c2
https://git.kernel.org/stable/c/daba84612236de3ab39083e62c9e326a654ebd20
https://git.kernel.org/stable/c/f2bbfd50e95bc117360f0f59e629aa03d821ebd6
https://git.kernel.org/stable/c/f4489260f5713c94e1966e5f20445bff262876f4
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.21
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.