CVE-2025-68232

Source
https://cve.org/CVERecord?id=CVE-2025-68232
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68232.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68232
Downstream
Published
2025-12-16T14:04:12.624Z
Modified
2026-03-10T21:49:48.656915Z
Summary
veth: more robust handing of race to avoid txq getting stuck
Details

In the Linux kernel, the following vulnerability has been resolved:

veth: more robust handing of race to avoid txq getting stuck

Commit dc82a33297fc ("veth: apply qdisc backpressure on full ptr_ring to reduce TX drops") introduced a race condition that can lead to a permanently stalled TXQ. This was observed in production on ARM64 systems (Ampere Altra Max).

The race occurs in vethxmit(). The producer observes a full ptrring and stops the queue (netiftxstop_queue()). The subsequent conditional logic, intended to re-wake the queue if the consumer had just emptied it (if (__ptrringempty(...)) netiftxwakequeue()), can fail. This leads to a "lost wakeup" where the TXQ remains stopped (QUEUESTATEDRVXOFF) and traffic halts.

This failure is caused by an incorrect use of the __ptrringempty() API from the producer side. As noted in kernel comments, this check is not guaranteed to be correct if a consumer is operating on another CPU. The empty test is based on ptrring->consumerhead, making it reliable only for the consumer. Using this check from the producer side is fundamentally racy.

This patch fixes the race by adopting the more robust logic from an earlier version V4 of the patchset, which always flushed the peer:

(1) In veth_xmit(), the racy conditional wake-up logic and its memory barrier are removed. Instead, after stopping the queue, we unconditionally call __vethxdpflush(rq). This guarantees that the NAPI consumer is scheduled, making it solely responsible for re-waking the TXQ. This handles the race where vethpoll() consumes all packets and completes NAPI before vethxmit() on the producer side has called netiftxstop_queue. The __vethxdpflush(rq) will observe rxnotifymasked is false and schedule NAPI.

(2) On the consumer side, the logic for waking the peer TXQ is moved out of vethxdprcv() and placed at the end of the vethpoll() function. This placement is part of fixing the race, as the netiftxqueuestopped() check must occur after rxnotifymasked is potentially set to false during NAPI completion. This handles the race where vethpoll() consumes all packets, but haven't finished (rxnotifymasked is still true). The producer vethxmit() stops the TXQ and __vethxdpflush(rq) will observe rxnotifymasked is true, meaning not starting NAPI. Then vethpoll() change rxnotifymasked to false and stops NAPI. Before exiting vethpoll() will observe TXQ is stopped and wake it up.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68232.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9fe31b3f314534e238aa6d0b6fb492134cbcf8be
Fixed
dd419a3f2ebc18cc00bc32c57fd052d7a188b78b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dc82a33297fc2c58cb0b2b008d728668d45c0f6a
Fixed
6c8a8b9257a660e622689e23c8fbad4ba2b561b9
Fixed
5442a9da69789741bfda39f34ee7f69552bf0c56

Affected versions

v6.*
v6.15
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.17.1
v6.17.2
v6.17.3
v6.17.4
v6.17.5
v6.17.6
v6.17.7
v6.17.8
v6.17.9
v6.18-rc1
v6.18-rc2
v6.18-rc3
v6.18-rc4
v6.18-rc5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68232.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.17.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68232.json"