-

CVE-2025-68200

In the Linux kernel, the following vulnerability has been resolved:

bpf: Add bpf_prog_run_data_pointers()

syzbot found that cls_bpf_classify() is able to change
tc_skb_cb(skb)->drop_reason triggering a warning in sk_skb_reason_drop().

WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline]
WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 sk_skb_reason_drop+0x76/0x170 net/core/skbuff.c:1214

struct tc_skb_cb has been added in commit ec624fe740b4 ("net/sched:
Extend qdisc control block with tc control block"), which added a wrong
interaction with db58ba459202 ("bpf: wire in data and data_end for
cls_act_bpf").

drop_reason was added later.

Add bpf_prog_run_data_pointers() helper to save/restore the net_sched
storage colliding with BPF data_meta/data_end.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < c4cdd143c35974a2cedd000fa9eb3accc3023b20
Version 0d76daf2013ce1da20eab5e26bd81d983e1c18fb
Status affected
Version < 5e149d8a8e732126fb6014efd60075cf63a73f91
Version ec624fe740b416fb68d536b37fb8eef46f90b5c2
Status affected
Version < baa61dcaa50b7141048c8d2aede7fe9ed8f21d11
Version ec624fe740b416fb68d536b37fb8eef46f90b5c2
Status affected
Version < 6392e5f4b1a3cce10e828309baf35d22abd3457d
Version ec624fe740b416fb68d536b37fb8eef46f90b5c2
Status affected
Version < 8dd2fe5f5d586c8e87307b7a271f6b994afcc006
Version ec624fe740b416fb68d536b37fb8eef46f90b5c2
Status affected
Version < 4ef92743625818932b9c320152b58274c05e5053
Version ec624fe740b416fb68d536b37fb8eef46f90b5c2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.16
Status affected
Version < 5.16
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.197
Status unaffected
Version <= 6.1.*
Version 6.1.159
Status unaffected
Version <= 6.6.*
Version 6.6.117
Status unaffected
Version <= 6.12.*
Version 6.12.59
Status unaffected
Version <= 6.17.*
Version 6.17.9
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.191
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.