CVE-2025-68325
BaseFortify
Publication date: 2025-12-18
Last updated on: 2025-12-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's network scheduler component called sch_cake. It involves incorrect queue length (qlen) reduction in the cake_drop function. Specifically, when cake_enqueue() returns NET_XMIT_CN, the parent queueing discipline (qdisc) stops enqueuing the current packet, causing the qlen and backlog accounting in the qdisc hierarchy to become inconsistent. This inconsistency can lead to a NULL pointer dereference, potentially causing a kernel crash or instability. The fix involves more robustly computing the qlen/backlog changes and compensating the accounting when cake_enqueue() returns NET_XMIT_CN.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel's network scheduler, which may lead to kernel crashes or system instability. Such crashes can disrupt network operations and potentially cause denial of service on affected systems.