CVE-2025-68725

Source
https://cve.org/CVERecord?id=CVE-2025-68725
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68725.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68725
Downstream
Related
Published
2025-12-24T10:33:09.610Z
Modified
2026-03-23T05:10:57.445936970Z
Summary
bpf: Do not let BPF test infra emit invalid GSO types to stack
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Do not let BPF test infra emit invalid GSO types to stack

Yinhao et al. reported that their fuzzer tool was able to trigger a skbwarnbadoffload() from netifskbfeatures() -> gsofeaturescheck(). When a BPF program - triggered via BPF test infra - pushes the packet to the loopback device via bpfclone_redirect() then mentioned offload warning can be seen. GSO-related features are then rightfully disabled.

We get into this situation due to convert__skbtoskb() setting gsosegs and gsosize but not gsotype. Technically, it makes sense that this warning triggers since the GSO properties are malformed due to the gsotype. Potentially, the gsotype could be marked non-trustworthy through setting it at least to SKBGSODODGY without any other specific assumptions, but that also feels wrong given we should not go further into the GSO engine in the first place.

The checks were added in 121d57af308d ("gso: validate gsotype in GSO handlers") because there were malicious (syzbot) senders that combine a protocol with a non-matching gsotype. If we would want to drop such packets, gsofeaturescheck() currently only returns feature flags via netifskbfeatures(), so one location for potentially dropping such skbs could be validatexmitunreadableskb(), but then otoh it would be an additional check in the fast-path for a very corner case. Given bpfclone_redirect() is the only place where BPF test infra could emit such packets, lets reject them right there.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68725.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
850a88cc4096fe1df407452ba2e4d28cf5b3eee9
Fixed
bb7902ed7d7f6d6a7c6c4dc25410d6127ce1085f
Fixed
e0ffb64a2d72c6705b4a4c9efef600409f7e98a0
Fixed
768376ece7036ecb8604961793a1b72afe6345dd
Fixed
8670b53b8ee91f028f7240531064020b7413c461
Fixed
0f3a60869ca22024dfb9c6fce412b0c70cb4ea36
Fixed
fbea4c63b5385588cb44ab21f91e55e33c719a54
Fixed
04a899573fb87273a656f178b5f920c505f68875

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68725.json"