VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68302

CVE-2025-68302

Description

In the Linux kernel, the following vulnerability has been resolved:

net: sxgbe: fix potential NULL dereference in sxgbe_rx()

Currently, when skb is null, the driver prints an error and then dereferences skb on the next line.

To fix this, let's add a 'break' after the error message to switch to sxgbe_rx_refill(), which is similar to the approach taken by the other drivers in this particular case, e.g. calxeda with xgmac_rx().

Found during a code review.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's sxgbe driver, a NULL pointer dereference in sxgbe_rx() when skb allocation fails is fixed by adding a break statement to prevent erroneous dereference.

Vulnerability

In the Linux kernel's sxgbe network driver, the receive function sxgbe_rx() contains a NULL pointer dereference vulnerability. When memory allocation for the socket buffer (skb) fails, the driver logs an error but then proceeds to dereference the NULL skb pointer on the next line, leading to a potential kernel crash.

Exploitation

This issue is triggered during normal packet reception when the system is under memory pressure, causing skb allocation to fail. An attacker does not need special privileges; any process that can trigger network receive operations on a system using the sxgbe driver can cause the condition. However, exploitation is dependent on memory exhaustion.

Impact

Successful exploitation results in a denial of service (kernel crash). The fix, as described in the CVE, adds a break statement after the error message to exit the processing loop and call sxgbe_rx_refill(), similar to other network drivers. The patch has been applied to the Linux kernel stable branches.

Mitigation

Users should update to a patched kernel version that includes the commit resolving this issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.