CVE-2025-21943Race Condition in Linux

CWE-362Race Condition57 documents7 sources
Severity
4.7MEDIUMNVD
OSV8.8OSV7.8OSV5.9OSV5.5
EPSS
0.1%
top 77.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1
Latest updateJul 17

Description

In the Linux kernel, the following vulnerability has been resolved: gpio: aggregator: protect driver attr handlers against module unload Both new_device_store and delete_device_store touch module global resources (e.g. gpio_aggregator_lock). To prevent race conditions with module unload, a reference needs to be held. Add try_module_get() in these handlers. For new_device_store, this eliminates what appears to be the most dangerous scenario: if an id is allocated from gpio_aggregator_idr but

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages10 packages

Patches

🔴Vulnerability Details

28
OSV
linux-hwe-6.8 vulnerabilities2025-07-17
OSV
linux-azure, linux-azure-6.11 vulnerabilities2025-07-08
OSV
linux-lowlatency, linux-lowlatency-hwe-6.11 vulnerabilities2025-07-04
OSV
linux-oem-6.11 vulnerabilities2025-06-30
OSV
linux-gcp, linux-gcp-6.8 vulnerabilities2025-06-30

📋Vendor Advisories

28
Ubuntu
Linux kernel (HWE) vulnerabilities2025-07-17
Ubuntu
Linux kernel (Azure) vulnerabilities2025-07-08
Ubuntu
Linux kernel (Low Latency) vulnerabilities2025-07-04
Ubuntu
Linux kernel vulnerabilities2025-06-30
Ubuntu
Linux kernel vulnerabilities2025-06-30