CVE-2025-40169
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's BPF (Berkeley Packet Filter) verifier. The check_alu_op() function validates ALU operation instructions, specifically their 'offset' field, which is a signed 16-bit integer. The original check intended to allow only offsets of 0 or 1, but due to the signed nature of the offset, it incorrectly accepted negative values like -1. This flaw could allow malformed BPF programs with invalid negative offsets to pass verification. The fix changes the validation to explicitly reject any offset other than 0 or 1, improving security by preventing malformed instructions.
How can this vulnerability impact me? :
This vulnerability could allow malformed BPF programs with invalid negative offsets to be accepted by the verifier, potentially leading to unexpected behavior or exploitation within the Linux kernel. Such malformed programs might be used to bypass security checks or cause kernel instability, which could impact system security and reliability.