CVE-2025-40254
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openvswitch | openvswitch | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's Open vSwitch component related to the handling of the set(nsh(...)) action. The validation logic for this action is incorrect because it uses the same function meant for other NSH keys, but set(nsh(...)) has a different memory layout with nested attributes doubled in size when masked. This causes improper validation, confusion between flags, and leads to kernel crashes due to NULL pointer dereferences during validation. The functionality never worked correctly since its introduction, and attempts to use it result in validation failures or kernel crashes. The fix was to remove this unsupported functionality entirely.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel NULL pointer dereference) when processing certain Open vSwitch NSH actions, leading to denial of service. If an attacker or misconfigured system attempts to use the set(nsh(...)) action, it can cause system instability or crashes. Additionally, even if a flow with such an action is installed, it will not function correctly due to mixed-up keys and masks.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is caused by a never-working feature in the Linux kernel's openvswitch module related to setting NSH fields. The fix is to remove this unsupported functionality altogether. Immediate mitigation would be to update the Linux kernel to a version where this vulnerability is resolved by removing the set(nsh(...)) action support in openvswitch. Since the feature never worked properly, disabling or avoiding use of NSH set actions in openvswitch flows can also help mitigate the issue until an update is applied.