CVE-2025-68341
Race Condition in Linux Kernel veth Component Causes Descriptor Corruption
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's veth (virtual Ethernet) implementation related to the XDP (eXpress Data Path) no_direct return section. Specifically, after napi_complete_done(), another CPU can start a new NAPI instance running veth_pool() concurrently with an existing one. The function xdp_clear_return_frame_no_direct() is not designed to be nested, leading to a race between two concurrent veth_pool() calls sharing the same BPF net context stored in the current task_struct. This race can cause exposure of old or uninitialized descriptors.
How can this vulnerability impact me? :
This race condition can lead to exposure of old or uninitialized descriptors in the veth interface, potentially causing incorrect or unexpected behavior in network packet processing. This may result in data corruption, instability, or security issues in systems relying on the affected Linux kernel networking components.