CVE-2025-40123
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an uninitialized pointer issue in the Linux kernel's BPF subsystem, specifically in the bpf_prog_test_run_xdp() function. It leads to a NULL pointer dereference when a BPF program tries to access the txq member of the xdp_buff structure. The root cause is that tailcalls between BPF programs can violate expected_attach_type constraints, allowing a program to call another program with incompatible attach types, which can cause invalid memory access. The fix enforces expected_attach_type compatibility for tailcall maps to prevent this issue.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel, potentially leading to kernel crashes or denial of service. It may allow malicious or buggy BPF programs to cause instability or unexpected behavior in the system by violating expected_attach_type constraints during tailcalls.