CVE-2025-38060
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's BPF verifier. The function copy_verifier_state() failed to copy the 'loop_entry' field of the bpf_verifier_state structure. Because of this, loop_entry values from unrelated states could incorrectly affect the current verifier state, potentially causing incorrect verification results. Additionally, states in the verification stack should not have a non-NULL loop_entry, but this was not properly enforced. This flaw could allow unsafe BPF programs to be accepted by the verifier without proper checks.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unsafe or incorrect BPF programs to be accepted by the Linux kernel verifier. This could lead to unexpected behavior or security issues in the kernel, as the verifier might not properly validate BPF programs that rely on loop states. It may cause kernel instability or potential exploitation if malicious BPF programs bypass verification.