Updated: 2025-11-19 04:09:47.203695
Description:
In the Linux kernel, the following vulnerability has been resolved: bpf: Don't redirect packets with invalid pkt_len Syzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any skbs, that is, the flow->head is null. The root cause, as the [2] says, is because that bpf_prog_test_run_skb() run a bpf prog which redirects empty skbs. So we should determine whether the length of the packet modified by bpf prog or others like bpf_prog_test is valid before forwarding it directly.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.8 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| CentOS 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Not Vulnerable | 2026-01-16 17:02:56 | ||
| CentOS 8.4 ELS | kernel | 4.18.0 | 7.8 | HIGH | Released | CLSA-2026:1771078945 | 2026-02-14 21:12:56 | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 7.8 | HIGH | Released | CLSA-2026:1771077729 | 2026-02-14 21:12:57 | |
| Oracle Linux 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Not Vulnerable | 2026-02-07 14:09:02 | ||
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.8 | HIGH | Needs Triage | 2025-11-19 08:47:58 | ||
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.8 | HIGH | Needs Triage | 2025-11-19 09:07:02 |