CVE-2025-38591
BaseFortify
Publication date: 2025-08-19
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and verifier bugs when running certain BPF programs that perform improper narrower pointer accesses. This may lead to instability or crashes in the kernel's BPF verifier, potentially affecting system reliability and security when using BPF programs that interact with network packet buffers.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's BPF subsystem involves improper handling of narrower access to pointer context fields. Specifically, a BPF program can perform a narrower read on a pointer field in the __sk_buff structure that is not properly validated, leading to a kernel warning and verifier bug during context access conversion. The issue arises because the verifier allows certain narrower reads that do not match expected offsets, causing incorrect validation and potential kernel warnings or crashes. The patch fixes this by returning a proper invalid access error for such loads.