{"id":"CVE-2025-68192","summary":"net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup\n\nRaw IP packets have no MAC header, leaving skb-\u003emac_header uninitialized.\nThis can trigger kernel panics on ARM64 when xfrm or other subsystems\naccess the offset due to strict alignment checks.\n\nInitialize the MAC header to prevent such crashes.\n\nThis can trigger kernel panics on ARM when running IPsec over the\nqmimux0 interface.\n\nExample trace:\n\n    Internal error: Oops: 000000009600004f [#1] SMP\n    CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.34-gbe78e49cb433 #1\n    Hardware name: LS1028A RDB Board (DT)\n    pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    pc : xfrm_input+0xde8/0x1318\n    lr : xfrm_input+0x61c/0x1318\n    sp : ffff800080003b20\n    Call trace:\n     xfrm_input+0xde8/0x1318\n     xfrm6_rcv+0x38/0x44\n     xfrm6_esp_rcv+0x48/0xa8\n     ip6_protocol_deliver_rcu+0x94/0x4b0\n     ip6_input_finish+0x44/0x70\n     ip6_input+0x44/0xc0\n     ipv6_rcv+0x6c/0x114\n     __netif_receive_skb_one_core+0x5c/0x8c\n     __netif_receive_skb+0x18/0x60\n     process_backlog+0x78/0x17c\n     __napi_poll+0x38/0x180\n     net_rx_action+0x168/0x2f0","modified":"2026-04-16T04:37:38.690815591Z","published":"2025-12-16T13:43:18.858Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68192.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0aabccdcec1f4a36f95829ea2263f845bbc77223"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e6b9004f01d0fef5b19778399bc5bf55f8c2d71"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ab3b8f958d861a7f725a5be60769106509fbd69"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae811175cea35b03ac6d7c910f43a82a43b9c3b3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf527b80b80a282ab5bf1540546211fc35e5cd42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d693c47fb902b988f5752182e4f7fbde5e6dcaf9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dd03780c29f87c26c0e0bb7e0db528c8109461fb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e120f46768d98151ece8756ebd688b0e43dc8b29"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68192.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68192"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c6adf77953bcec0ad63d7782479452464e50f7a3"},{"fixed":"d693c47fb902b988f5752182e4f7fbde5e6dcaf9"},{"fixed":"0aabccdcec1f4a36f95829ea2263f845bbc77223"},{"fixed":"4e6b9004f01d0fef5b19778399bc5bf55f8c2d71"},{"fixed":"bf527b80b80a282ab5bf1540546211fc35e5cd42"},{"fixed":"dd03780c29f87c26c0e0bb7e0db528c8109461fb"},{"fixed":"ae811175cea35b03ac6d7c910f43a82a43b9c3b3"},{"fixed":"8ab3b8f958d861a7f725a5be60769106509fbd69"},{"fixed":"e120f46768d98151ece8756ebd688b0e43dc8b29"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68192.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.12.0"},{"fixed":"5.4.302"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.117"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.58"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68192.json"}}],"schema_version":"1.7.5"}