CVE-2025-68336
Data Race Vulnerability in Linux Kernel do_raw_write_lock Function
Publication date: 2025-12-22
Last updated on: 2025-12-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data-race condition in the Linux kernel's do_raw_write_lock function related to spinlock debugging. Specifically, there is a race between write and read accesses to a shared variable, which was not fully protected by the WRITE_ONCE() macro in all parts of the code. This can lead to inconsistent or unexpected behavior in kernel locking mechanisms.
How can this vulnerability impact me? :
The data-race in the kernel locking code can cause unpredictable behavior, including potential kernel crashes or instability. This may affect system reliability and could be exploited to cause denial of service or other unintended side effects in the kernel.