CVE-2025-68301
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aqantia | aqc113 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's atlantic network driver, specifically in how it handles packet fragments in the receive (RX) path. The driver can receive packets with more fragments than the maximum allowed (MAX_SKB_FRAGS, which is 17). When this happens, the driver does not properly check the total number of fragments before adding them, leading to an out-of-bounds write in the function skb_add_rx_frag_netmem(). This out-of-bounds write can cause a kernel panic (system crash). The issue arises because the fragment index exceeds the array bounds when handling large multi-descriptor packets.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic, which means the affected system can crash unexpectedly. Such crashes can lead to denial of service, disrupting normal operations and potentially causing data loss or system unavailability. Since it occurs in the network driver, it could be triggered remotely by sending specially crafted network packets, impacting system stability and reliability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the atlantic driver fragment overflow handling in the RX path. This fix prevents out-of-bounds writes by properly checking the number of fragments before processing packets. Avoid using vulnerable versions of the atlantic driver with Aquantia AQC113 10G NICs until patched.