VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68200

CVE-2025-68200

Description

In the Linux kernel, the following vulnerability has been resolved:

bpf: Add bpf_prog_run_data_pointers()

syzbot found that cls_bpf_classify() is able to change tc_skb_cb(skb)->drop_reason triggering a warning in sk_skb_reason_drop().

WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline] WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 sk_skb_reason_drop+0x76/0x170 net/core/skbuff.c:1214

struct tc_skb_cb has been added in commit ec624fe740b4 ("net/sched: Extend qdisc control block with tc control block"), which added a wrong interaction with db58ba459202 ("bpf: wire in data and data_end for cls_act_bpf").

drop_reason was added later.

Add bpf_prog_run_data_pointers() helper to save/restore the net_sched storage colliding with BPF data_meta/data_end.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, BPF programs in cls_bpf can corrupt tc_skb_cb drop_reason, causing a kernel warning; fixed by adding bpf_prog_run_data_pointers().

Vulnerability

A vulnerability exists in the Linux kernel's BPF and net/sched subsystems where the cls_bpf_classify() function can modify the drop_reason field in tc_skb_cb. This field was introduced to track the reason for dropping packets, but when a BPF program is executed via cls_bpf_classify(), it writes BPF's data pointers (data_meta/data_end) into the same storage area that holds the drop_reason, corrupting it. This leads to a kernel warning in sk_skb_reason_drop().

Exploitation

An attacker who can attach a BPF program to a tc classifier (requires CAP_NET_ADMIN) can trigger this issue by sending packets that cause the BPF program to run. No other authentication is needed. The bug was discovered by syzbot, indicating it can be triggered without special privileges beyond the ability to configure BPF programs.

Impact

When the corrupted drop_reason is used, a warning is generated: WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop. This results in a kernel panic or at least a denial of service due to the warning. There is no evidence of code execution beyond this warning.

Mitigation

The fix is committed in Linux kernel stable branches as patches [1][2]. The commit introduces bpf_prog_run_data_pointers() to save and restore the net_sched storage that collides with BPF data pointers. Users should apply the latest kernel updates to mitigate the issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.