CVE-2025-40290
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's xsk (AF_XDP) subsystem involves improper use of the skb control block to store the completion queue descriptor number. Since the skb control block can be used by other subsystems and xsk loses control over it after transmit, this misuse can lead to a kernel panic caused by a NULL pointer dereference. The issue arises because the descriptor number is stored in a place that is not reliable, leading to a fatal exception in interrupt context. The fix involves using the skb destructor_arg pointer with pointer tagging to safely store the necessary information.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic and crash due to a NULL pointer dereference in the xsk subsystem. This results in a system crash (kernel panic), which can lead to denial of service as the system becomes unresponsive and requires a reboot. It affects system stability and reliability, potentially disrupting services running on affected Linux systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel panic messages related to NULL pointer dereferences in the xsk subsystem. Specifically, look for logs indicating 'BUG: kernel NULL pointer dereference' and call traces involving xsk_destruct_skb. Commands to check kernel logs include: 'dmesg | grep -i xsk' or 'journalctl -k | grep -i xsk'. Additionally, monitoring for system crashes or Oops messages related to xsk can help identify the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Linux kernel to a version that includes the fix for this vulnerability, specifically one that contains the commit '30f241fcf52a' which corrects the handling of the cq descriptor number in the xsk subsystem. Avoid using affected kernel versions and apply vendor-provided patches or kernel updates as soon as possible.