CVE-2025-40159
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper validation of userspace-supplied xdp_desc structures. Specifically, certain invalid values in xdp_desc can bypass validation functions, leading to undefined behaviors or invalid frames being queued for transmission. The issue arises from integer overflow and wraparound when desc->len is close to U32_MAX or desc->addr is low, combined with a non-zero tx_metadata_len. This can allow attackers to exploit the kernel by passing malformed descriptors that should have been rejected.
How can this vulnerability impact me? :
This vulnerability can lead to undefined behavior in the Linux kernel, such as processing invalid network frames or triggering kernel memory issues. An attacker could exploit this to cause system instability, crashes, or potentially execute further attacks by injecting malformed data into the kernel's networking stack.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the Linux kernel version that includes the fix for this vulnerability, which hardens userspace-supplied xdp_desc validation by promoting desc->len to u64 and using explicit overflow checks. Avoid running untrusted XSk applications that may supply invalid xdp_desc values.