CVE-2025-40151
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel on the LoongArch architecture, where the BPF (Berkeley Packet Filter) implementation does not support struct arguments in trampoline programs. When such a struct argument is used, it causes a kernel oops (crash) during the BPF selftest, leading to kernel paging errors and potential system instability.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to crash (oops) when running BPF programs that use struct arguments on LoongArch systems. This can lead to system instability, CPU stalls, and potentially out-of-memory (OOM) conditions, affecting system reliability and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the bpf selftest that triggers the issue, specifically the command: ./test_progs -a tracing_struct. If the system is vulnerable, it will cause a kernel oops with messages related to kernel paging request failures and RCU stalls as described in the vulnerability details.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves rejecting or avoiding the use of BPF trampoline programs with struct arguments on LoongArch architecture until a patched kernel version is applied that supports this feature correctly.