CVE-2025-40143
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's BPF verifier incorrectly reporting a bug (verifier_bug) during speculative execution paths. The verifier assumed that a certain data structure (bpf_scc_visit) would always be allocated for states within strongly connected components (SCCs), but this assumption does not hold for speculative paths. As a result, the verifier could trigger an erroneous bug report. The patch removes this incorrect bug report for speculative paths, fixing the issue.
How can this vulnerability impact me? :
This vulnerability could cause the BPF verifier in the Linux kernel to incorrectly report bugs during speculative execution, potentially leading to false positives in verification. This might affect the reliability of BPF program verification and could impact system stability or debugging processes, but it does not indicate a direct security compromise or exploit.