CVE-2025-68372
Use-After-Free Vulnerability in Linux Kernel NBD recv_work Component
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's Network Block Device (NBD) driver, specifically in the recv_work function when handling NBD_CLEAR_SOCK and NBD_CMD_RECONFIGURE commands. The problem arises because the reference count to a configuration object (config_ref) is decremented too early, leading to the config being freed while still in use by the worker thread. This can cause the kernel to access freed memory, potentially leading to crashes or other unpredictable behavior. The fix involved moving the config_put call to the end of recv_work to ensure the configuration object remains valid for the entire lifetime of the worker thread.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to access freed memory, which may lead to system instability, crashes, or potential exploitation by attackers to execute arbitrary code or cause denial of service. Since it affects the kernel's NBD driver, systems using NBD could be at risk of these impacts if the vulnerability is triggered.