In the Linux kernel, the following vulnerability has been resolved:
bpf: Add bpfprogrundatapointers()
syzbot found that clsbpfclassify() is able to change tcskbcb(skb)->dropreason triggering a warning in skskbreasondrop().
WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 _skskbreasondrop net/core/skbuff.c:1189 [inline] WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 skskbreason_drop+0x76/0x170 net/core/skbuff.c:1214
struct tcskbcb has been added in commit ec624fe740b4 ("net/sched: Extend qdisc control block with tc control block"), which added a wrong interaction with db58ba459202 ("bpf: wire in data and dataend for clsact_bpf").
drop_reason was added later.
Add bpfprogrundatapointers() helper to save/restore the netsched storage colliding with BPF datameta/data_end.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68200.json",
"cna_assigner": "Linux"
}