CVE-2025-40078 — Improper Input Validation in Linux
Severity
7.8HIGHOSV
OSV5.5OSV3.2
No vectorEPSS
0.1%
top 81.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 28
Latest updateApr 13
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Explicitly check accesses to bpf_sock_addr
Syzkaller found a kernel warning on the following sock_addr program:
0: r0 = 0
1: r2 = *(u32 *)(r1 +60)
2: exit
which triggers:
verifier bug: error during ctx access conversion (0)
This is happening because offset 60 in bpf_sock_addr corresponds to an
implicit padding of 4 bytes, right after msg_src_ip4. Access to this
padding isn't rejected in sock_addr_is_valid_access and i…
Affected Packages7 packages
▶CVEListV5linux/linux1cedee13d25ab118d325f95588c1a084e9317229 — de44cdc50d2dce8718cb57deddf9cf1be9a7759f+8