CVEFinder.io

CVE-2025-68341

🔶 medium
Summary

In the Linux kernel, the following vulnerability has been resolved: veth: reduce XDP no_direct return section to fix race As explain in commit fa349e396e48 ("veth: Fix race with AF_XDP exposing old or uninitialized descriptors") for veth there is a chance after napi_complete_done() that another CPU can manage start another NAPI instance running veth_pool(). For NAPI this is correctly handled as the napi_schedule_prep() check will prevent multiple instances from getting scheduled, but for the r

Description

In the Linux kernel, the following vulnerability has been resolved:

veth: reduce XDP no_direct return section to fix race

As explain in commit fa349e396e48 ("veth: Fix race with AF_XDP exposing
old or uninitialized descriptors") for veth there is a chance after
napi_complete_done() that another CPU can manage start another NAPI
instance running veth_pool(). For NAPI this is correctly handled as the
napi_schedule_prep() check will prevent multiple instances from getting
scheduled, but for the remaining code in veth_pool() this can run
concurrent with the newly started NAPI instance.

The problem/race is that xdp_clear_return_frame_no_direct() isn't
designed to be nested.

Prior to commit 401cb7dae813 ("net: Reference bpf_redirect_info via
task_struct on PREEMPT_RT.") the temporary BPF net context
bpf_redirect_info was stored per CPU, where this wasn't an issue. Since
this commit the BPF context is stored in 'current' task_struct. When
running veth in threaded-NAPI mode, then the kthread becomes the storage
area. Now a race exists between two concurrent veth_pool() function calls
one exiting NAPI and one running new NAPI, both using the same BPF net
context.

Race is when another CPU gets within the xdp_set_return_frame_no_direct()
section before exiting veth_pool() calls the clear-function
xdp_clear_return_frame_no_direct().

CVSS Score
-
EPSS Score
0.0
Exploit Probability
Published Date
2025-12-23
First Seen: 2026-01-05
Last Modified 2025-12-23

🔗 References 3

📦 Affected Products 4

🔗 Related CVEs 6

CVE ID Severity CVSS EPSS Summary Published
CVE-2025-68338 🔶 medium - 0.0 In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_i... 2025-12-23
CVE-2025-68339 🔶 medium - 0.0 In the Linux kernel, the following vulnerability has been resolved: atm/fore200e: Fix possible data race in fore200e_op... 2025-12-23
CVE-2025-68340 🔶 medium - 0.0 In the Linux kernel, the following vulnerability has been resolved: team: Move team device type change at the end of te... 2025-12-23
CVE-2025-68342 🔶 medium - 0.0 In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check ... 2025-12-23
CVE-2025-68343 🔶 medium - 0.0 In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check ... 2025-12-23
CVE-2025-68326 🔶 medium - 0.0 In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Fix stack_depot usage Add missing stac... 2025-12-22
These CVEs affect the same products