In the Linux kernel, the following vulnerability has been resolved:
net: vxlan: prevent NULL deref in vxlanxmitone
Neither sock4 nor sock6 pointers are guaranteed to be non-NULL in vxlanxmitone, e.g. if the iface is brought down. This can lead to the following NULL dereference:
BUG: kernel NULL pointer dereference, address: 0000000000000010 Oops: Oops: 0000 [#1] SMP NOPTI RIP: 0010:vxlanxmitone+0xbb3/0x1580 Call Trace: vxlanxmit+0x429/0x610 devhardstartxmit+0x55/0xa0 _devqueuexmit+0x6d0/0x7f0 ipfinishoutput2+0x24b/0x590 ipoutput+0x63/0x110
Mentioned commits changed the code path in vxlanxmitone and as a side effect the sock4/6 pointer validity checks in vxlan(6)getroute were lost. Fix this by adding back checks.
Since both commits being fixed were released in the same version (v6.7) and are strongly related, bundle the fixes in a single commit.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68353.json",
"cna_assigner": "Linux"
}