CVE-2025-40078
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's BPF (Berkeley Packet Filter) subsystem, specifically related to the bpf_sock_addr structure. The issue arises because an implicit 4-byte padding after the msg_src_ip4 field was not properly checked for access validity. This caused a kernel warning and verifier bug when a program tried to access this padding area, which was not rejected as an invalid access. The vulnerability was fixed by explicitly checking all fields of bpf_sock_addr to prevent invalid accesses.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and verifier bugs, potentially leading to instability or crashes in the Linux kernel when BPF programs access invalid memory areas. It may affect the reliability and security of systems using BPF programs that interact with bpf_sock_addr, possibly allowing malformed BPF programs to trigger unexpected behavior.