CVE-2025-68234
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: io_uring/cmd_net: fix wrong argument types for skb_queue_splice() If timestamp retriving needs to be retried and the local list of SKB's already has entries, then it's spliced back into the socket queue. However, the arguments for the splice helper are transposed, causing exactly the wrong direction of splicing into the on-stack list. Fix that up.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-18
Generated
2026-05-06
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves incorrect argument types being passed to the skb_queue_splice() function within the io_uring/cmd_net component. Specifically, when timestamp retrieval needs to be retried and the local list of SKBs (socket buffers) already contains entries, the list is spliced back into the socket queue. However, due to the arguments being transposed, the splicing occurs in the wrong direction, which is incorrect behavior. The fix corrects the argument order to ensure proper splicing.


How can this vulnerability impact me? :

The vulnerability causes incorrect splicing of socket buffer lists in the Linux kernel's network code, which could potentially lead to unexpected behavior in network packet handling. This might result in data corruption, packet loss, or instability in network communication. However, specific impacts such as security breaches or system crashes are not detailed in the provided information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart