VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68192

CVE-2025-68192

Description

In the Linux kernel, the following vulnerability has been resolved:

net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup

Raw IP packets have no MAC header, leaving skb->mac_header uninitialized. This can trigger kernel panics on ARM64 when xfrm or other subsystems access the offset due to strict alignment checks.

Initialize the MAC header to prevent such crashes.

This can trigger kernel panics on ARM when running IPsec over the qmimux0 interface.

Example trace:

Internal error: Oops: 000000009600004f [#1] SMP CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.34-gbe78e49cb433 #1 Hardware name: LS1028A RDB Board (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : xfrm_input+0xde8/0x1318 lr : xfrm_input+0x61c/0x1318 sp : ffff800080003b20 Call trace: xfrm_input+0xde8/0x1318 xfrm6_rcv+0x38/0x44 xfrm6_esp_rcv+0x48/0xa8 ip6_protocol_deliver_rcu+0x94/0x4b0 ip6_input_finish+0x44/0x70 ip6_input+0x44/0xc0 ipv6_rcv+0x6c/0x114 __netif_receive_skb_one_core+0x5c/0x8c __netif_receive_skb+0x18/0x60 process_backlog+0x78/0x17c __napi_poll+0x38/0x180 net_rx_action+0x168/0x2f0

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's qmi_wwan driver, uninitialized MAC header offset in qmimux_rx_fixup causes kernel panics on ARM64 when IPsec traffic.

Vulnerability

In the Linux kernel's qmi_wwan driver, the qmimux_rx_fixup function processes raw IP packets that lack a MAC header. The skb->mac_header offset is left uninitialized, which can trigger kernel panics on ARM64 architectures when subsystems like xfrm (IPsec) access the offset due to strict alignment checks [1].

Exploitation

An attacker can trigger this vulnerability by sending specially crafted network traffic that reaches the qmimux0 interface, specifically IPsec (ESP) packets processed by the xfrm subsystem. The crash occurs during packet reception in the network stack, as shown in the kernel trace where xfrm_input dereferences the uninitialized MAC header offset [1]. No authentication or special privileges are required beyond sending crafted packets to the vulnerable interface.

Impact

Successful exploitation leads to a kernel panic (Oops) on ARM64 systems, causing a denial of service (DoS). The crash trace shows the panic in xfrm_input during IPsec processing, which can be triggered by remote packets from the network [1].

Mitigation

The fix initializes the MAC header offset in qmimux_rx_fixup to prevent the crash. The patch has been applied to the Linux kernel stable tree [1]. Users should update to a kernel version containing this fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.