
Cloud Vulnerability DB
A community-led vulnerabilities database
A race condition vulnerability has been identified in the Linux kernel (CVE-2025-38617) affecting the packet subsystem, specifically in the interaction between packetsetring() and packet_notifier() functions. The vulnerability was discovered and disclosed in August 2025, affecting the Linux kernel's networking components (NVD).
The vulnerability occurs when packetsetring() releases po->bindlock, allowing another thread to run packetnotifier() and process an NETDEVUP event. This race condition is similar to a previously fixed issue (commit 15fe076edea7) where packetnotifier NETDEVUP event could run while a po->bindlock critical section had to be temporarily released. The fix involves temporarily setting po->num to zero to keep the socket unhooked until the lock is retaken (NVD).
While specific impact details are not fully disclosed in the available sources, the vulnerability affects the Linux kernel's networking stack and could potentially lead to race conditions in packet processing, which might affect network functionality or security.
The vulnerability has been fixed in various Linux kernel versions across different distributions. Ubuntu has implemented fixes in kernel version 6.8.0-40.40 for noble (24.04 LTS) and similar versions for other kernel variants. The fix has also been backported to different kernel branches (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."