CVE-2025-68200
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's BPF (Berkeley Packet Filter) subsystem, where the function cls_bpf_classify() can improperly change the drop_reason field in the tc_skb_cb structure. This triggers warnings in the sk_skb_reason_drop() function, indicating a problematic interaction between recently added kernel components related to traffic control and BPF data handling. The issue was caused by conflicting changes in the kernel's network scheduling and BPF code, and was resolved by adding a helper function bpf_prog_run_data_pointers() to properly manage net_sched storage and BPF data pointers.
How can this vulnerability impact me? :
The vulnerability can cause incorrect handling of packet drop reasons within the Linux kernel's networking stack, potentially leading to warnings or instability in network packet processing. This could affect network performance or reliability on systems using the affected kernel versions, especially those relying on BPF for traffic control and classification.