CVE-2025-39990
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the BPF (Berkeley Packet Filter) subsystem where a helper function pointer could be NULL due to a disabled configuration option. The issue was that the verifier did not properly check if the helper function was valid in the get_helper_proto function. The fix involved adding a check to ensure the helper function pointer is valid and marking the tail_call helper function pointer with BPF_PTR_POISON since it is unused by design.
How can this vulnerability impact me? :
If exploited, this vulnerability could potentially cause the kernel verifier to behave incorrectly, possibly leading to kernel instability or security issues related to BPF programs. Since the helper function pointer could be NULL, it might cause unexpected behavior or crashes when BPF programs are verified or executed.