CVE-2025-68742
Invalid Memory Access in Linux Kernel BPF Program Stats Update
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's BPF (Berkeley Packet Filter) subsystem. When a fault is injected during the update_effective_progs function, it causes the function to fail and replace the original BPF program with a dummy program. Later, during a softirq (a type of interrupt), the kernel tries to access statistics of this dummy program, but since the stats pointer is invalid (NULL), it leads to an invalid memory access. The fix involves skipping the stats update when the stats pointer is NULL to prevent this invalid memory access.
How can this vulnerability impact me? :
This vulnerability can cause invalid memory access in the Linux kernel, which may lead to kernel crashes or instability. Such crashes can result in denial of service or system downtime, impacting the reliability and availability of systems running vulnerable kernel versions.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the invalid memory access in the Linux kernel's BPF subsystem by skipping stats updates when stats is NULL. This involves updating the kernel to a version that includes the fix for the issue in update_effective_progs and purge_effective_progs functions to prevent invalid memory access during softirq processing.