In the Linux kernel, the following vulnerability has been resolved: io_uring/cmd_net: fix wrong argument types for skb_queue_splice() If timestamp retriving needs to be retried and the local list of SKB's already has entries, then it's spliced back into the socket queue. However, the arguments for the splice helper are transposed, causing exactly the wrong direction of splicing into the on-stack list. Fix that up.
History

Tue, 16 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: io_uring/cmd_net: fix wrong argument types for skb_queue_splice() If timestamp retriving needs to be retried and the local list of SKB's already has entries, then it's spliced back into the socket queue. However, the arguments for the splice helper are transposed, causing exactly the wrong direction of splicing into the on-stack list. Fix that up.
Title io_uring/cmd_net: fix wrong argument types for skb_queue_splice()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-12-16T14:04:14.300Z

Reserved: 2025-12-16T13:41:40.258Z

Link: CVE-2025-68234

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-16T14:15:58.267

Modified: 2025-12-16T14:15:58.267

Link: CVE-2025-68234

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.