CVE-2025-68813
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the IPv4 code path of the Linux kernel's IP Virtual Server (IPVS) component. Specifically, when IPVS processes a packet in NAT mode with a misconfigured destination, a route lookup fails and the error handling code calls dst_link_failure() with a NULL skb->dev pointer. This leads to a NULL pointer dereference in fib_compute_spec_dst() when it tries to access skb->dev, causing a kernel crash. The issue arises because the code does not properly set skb->dev before calling dst_link_failure(), and a previous attempted fix was incomplete.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (NULL pointer dereference) when IPVS processes certain packets with misconfigured destinations. This can lead to denial of service (DoS) conditions on affected Linux systems running IPVS, potentially disrupting network services and affecting system stability.
What immediate steps should I take to mitigate this vulnerability?
Apply the fix that sets skb->dev from skb_dst(skb)->dev before calling dst_link_failure(), as done in the referenced commit for IPv6. This involves updating the Linux kernel to a version that includes this fix to prevent the NULL pointer dereference in the IPv4 IPVS code path.