CVE-2025-68775
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the handling of handshake cancellations in the network handshake code. When a handshake request is cancelled, it is removed from one list but remains in another until destroyed. If a second cancellation request for the same handshake arrives, the code incorrectly processes it, leading to a reference count underflow by adding an extra reference to the socket. This can occur, for example, when a handshake times out, causing duplicate cancellation requests from client and server sides. The fix involves detecting duplicate cancellations to prevent this issue.
How can this vulnerability impact me? :
The vulnerability can lead to a reference count underflow in the Linux kernel's network handshake code, which may cause memory corruption or instability in the kernel. This could potentially be exploited to cause denial of service or other unpredictable behavior in systems using the affected Linux kernel.