CVE-2025-40350
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's mlx5 network driver mishandling the layout changes of xdp_buff structures made by XDP programs. XDP programs can modify the linear and non-linear data areas of xdp_buff using bpf_xdp_adjust_tail() and bpf_xdp_adjust_head(). The mlx5 driver incorrectly assumes the layout remains unchanged, which can lead to generating erroneous socket buffers (skb) or triggering kernel warnings and errors. The fix involves properly tracking changes in fragment counts and sizes after XDP programs run, and correctly building skb with the updated linear data area.
How can this vulnerability impact me? :
This vulnerability can cause the mlx5 driver to generate incorrect socket buffers or trigger kernel warnings and errors, potentially leading to network packet processing issues or kernel instability. This may affect system reliability and network performance on systems using the affected driver with XDP programs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the mlx5 driver has been fixed to properly handle changes in xdp_buff layout caused by XDP programs. This fix ensures that skb generation accounts for linear data and fragment changes, preventing kernel warnings or errors.