CVE-2025-40337
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's stmmac network driver involves improper handling of hardware checksum offload errors. Previously, the driver would mark packets as having valid checksums without verifying if the hardware reported any checksum errors. As a result, corrupt packets with checksum errors could be passed up the network stack as if they were valid. The fix ensures that when the hardware indicates a checksum error, the kernel marks the packet to require software checksum validation, preventing corrupt packets from being treated as valid.
How can this vulnerability impact me? :
This vulnerability can lead to corrupt network packets being accepted as valid by the Linux kernel's network stack. This may cause data integrity issues, potential application errors, or security risks if corrupted data is processed without detection.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the patch correcting the handling of Rx checksum offload errors in the stmmac driver. This patch ensures that checksum errors reported by hardware are properly handled, preventing corrupt packets from being accepted as valid.