Linux Kernel Vulnerability in IPsec Tunnel Mode Affecting Multiple Versions
CVE-2025-21674
Summary
The Linux kernel vulnerability arises from an improper locking mechanism when enabling IPsec packet offload in tunnel mode, potentially triggering a kernel panic. This is caused by a sequence of lock dependencies that could result in a deadlock scenario. Specifically, an issue exists in the SA add section where the appropriate _bh() variant should be employed for marking SA mode, while the flush_workqueue in the SA delete routine is deemed unnecessary. This vulnerability calls for immediate attention to avoid service interruptions and maintain network security.
Affected Version(s)
Linux 4c24272b4e2befca6ad1409c3c9aaa16c24b1099 < 87c4417a902151cfe4363166245a3671a08c256c
Linux 4c24272b4e2befca6ad1409c3c9aaa16c24b1099 < 6d3d69c070d920fbb146d73dd3899a50f25d0901
Linux 4c24272b4e2befca6ad1409c3c9aaa16c24b1099 < 2c3688090f8a1f085230aa839cc63e4a7b977df0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved