### [CVE-2025-21659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21659) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=27f91aaf49b3a50e5a02ad5fa27b7c453d029a72%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:netdev: prevent accessing NAPI instances from another namespaceThe NAPI IDs were not fully exposed to user space prior to the netlinkAPI, so they were never namespaced. The netlink API must ensure thatat the very least NAPI instance belongs to the same netns as the ownerof the genl sock.napi_by_id() can become static now, but it needs to move because ofdev_get_by_napi_id(). ### POC #### Reference No PoCs from references. #### Github - https://github.com/oogasawa/Utility-security