CVE-2025-68768
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a deadlock in the Linux kernel related to the handling of fragmented network packets. Specifically, the issue occurs because fragment queues (skbs) are not properly flushed during the network namespace exit process, causing references held by the connection tracking system (conntrack) to persist. This leads to a deadlock when conntrack tries to clean up, as it loops indefinitely waiting for these references to be released. The root cause is the order in which netns exit hooks run, with nf_defrag_ipv6 running after conntrack, preventing proper cleanup. The fix involves flushing all fragment queue skbs during the fqdir_pre_exit() function to release conntrack references before cleanup.
How can this vulnerability impact me? :
This vulnerability can cause deadlocks in the Linux kernel networking stack, leading to system instability or crashes. Specifically, tasks such as modprobe may hang indefinitely while waiting for locks, potentially causing network services or drivers to become unresponsive. This can disrupt normal network operations and affect system reliability.