CVE-2025-40292 — Improper Handling of Length Parameter Inconsistency in Linux
Severity
3.2LOWOSV
No vectorEPSS
0.1%
top 84.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Latest updateApr 9
Description
In the Linux kernel, the following vulnerability has been resolved:
virtio-net: fix received length check in big packets
Since commit 4959aebba8c0 ("virtio-net: use mtu size as buffer length
for big packets"), when guest gso is off, the allocated size for big
packets is not MAX_SKB_FRAGS * PAGE_SIZE anymore but depends on
negotiated MTU. The number of allocated frags for big packets is stored
in vi->big_packets_num_skbfrags.
Because the host announced buffer length can be malicious (e.g. the …
Affected Packages7 packages
▶CVEListV5linux/linux4959aebba8c06992abafa09d1e80965e0825af54 — 82f9028e83944a9eee5229cbc6fee9be1de8a62d+5