CVE-2025-68725
Invalid GSO Type Handling in Linux Kernel BPF Causes Offload Warning
Publication date: 2025-12-24
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 5.6 (inc) to 5.10.249 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.2 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's BPF (Berkeley Packet Filter) test infrastructure emitting invalid GSO (Generic Segmentation Offload) types to the network stack. Specifically, when a BPF program uses bpf_clone_redirect() to push packets to the loopback device, malformed GSO properties occur because gso_type is not properly set, leading to warnings and potentially incorrect handling of packets. The issue arises from convert___skb_to_skb() setting gso_segs and gso_size but not gso_type, which can cause offload features to be disabled or misused. The fix rejects such malformed packets at the point of emission to prevent further issues.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to process network packets with malformed GSO properties, potentially leading to offload warnings and disabling of GSO-related features. While it does not explicitly state a direct exploit, malformed packets could affect network performance or stability by triggering warnings and disabling optimizations. It may also open a vector for malicious actors to send crafted packets that bypass normal checks, although the fix aims to reject such packets early.