CVE-2025-68234
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves incorrect argument types being passed to the skb_queue_splice() function within the io_uring/cmd_net component. Specifically, when timestamp retrieval needs to be retried and the local list of SKBs (socket buffers) already contains entries, the list is spliced back into the socket queue. However, due to the arguments being transposed, the splicing occurs in the wrong direction, which is incorrect behavior. The fix corrects the argument order to ensure proper splicing.
How can this vulnerability impact me? :
The vulnerability causes incorrect splicing of socket buffer lists in the Linux kernel's network code, which could potentially lead to unexpected behavior in network packet handling. This might result in data corruption, packet loss, or instability in network communication. However, specific impacts such as security breaches or system crashes are not detailed in the provided information.