VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68234

CVE-2025-68234

Description

In the Linux kernel, the following vulnerability has been resolved:

io_uring/cmd_net: fix wrong argument types for skb_queue_splice()

If timestamp retriving needs to be retried and the local list of SKB's already has entries, then it's spliced back into the socket queue. However, the arguments for the splice helper are transposed, causing exactly the wrong direction of splicing into the on-stack list. Fix that up.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A transposed argument in skb_queue_splice() within Linux kernel's io_uring network command handling causes incorrect SKB splicing, potentially leading to data corruption or denial of service.

Vulnerability

Overview

In the Linux kernel's io_uring subsystem, specifically in the cmd_net path, a bug exists in the skb_queue_splice() function call. When timestamp retrieval needs to be retried and the local list of SKBs already has entries, the code attempts to splice the list back into the socket queue. However, the arguments to the splice helper are transposed, causing the splice to occur in the wrong direction—into the on-stack list instead of back into the socket queue [1].

Exploitation

Conditions

This vulnerability is triggered during a specific error-handling path: when timestamp retrieval is retried and the local SKB list is non-empty. An attacker would need to be able to influence the timing or state of network operations to cause such a retry. The bug is a logic error in kernel code, not a direct user-triggerable flaw, but it could be exploited by a local user with access to io_uring operations or by a remote attacker if the system is processing network packets in a way that triggers the retry path.

Impact

If exploited, the incorrect splicing could lead to data corruption within the kernel's network stack, as SKBs are moved to the wrong list. This could result in memory corruption, system instability, or a denial of service. The exact impact depends on the kernel's memory management and the state of the socket queue at the time of the bug.

Mitigation

The fix is included in the Linux kernel stable tree as commit c85d2cfc5e24e6866b56c7253fd4e1c7db35986c [1]. Users should update their kernels to a version containing this patch. No workaround is available beyond applying the kernel update.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.