-

CVE-2025-40078

bpf: Explicitly check accesses to bpf_sock_addr

In the Linux kernel, the following vulnerability has been resolved:

bpf: Explicitly check accesses to bpf_sock_addr

Syzkaller found a kernel warning on the following sock_addr program:

    0: r0 = 0
    1: r2 = *(u32 *)(r1 +60)
    2: exit

which triggers:

    verifier bug: error during ctx access conversion (0)

This is happening because offset 60 in bpf_sock_addr corresponds to an
implicit padding of 4 bytes, right after msg_src_ip4. Access to this
padding isn't rejected in sock_addr_is_valid_access and it thus later
fails to convert the access.

This patch fixes it by explicitly checking the various fields of
bpf_sock_addr in sock_addr_is_valid_access.

I checked the other ctx structures and is_valid_access functions and
didn't find any other similar cases. Other cases of (properly handled)
padding are covered in new tests in a subsequent patch.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < de44cdc50d2dce8718cb57deddf9cf1be9a7759f
Status affected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < 76e04bbb4296fb6eac084dbfc27e02ccc744db3e
Status affected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < 6d8b1a21fd5c34622b0c3893c61e4a38d8ba53ec
Status affected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < 4f00858cd9bbbdf67159e28b85a8ca9e77c83622
Status affected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < cdeafacb4f9ff261a96baef519e29480fd7b1019
Status affected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < fe9d33f0470350558cb08cecb54cf2267b3a45d2
Status affected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < ad8b4fe5617e3c85fc23267f02500c4f3bf0ff69
Status affected
Version 1cedee13d25ab118d325f95588c1a084e9317229
Version < 6fabca2fc94d33cdf7ec102058983b086293395f
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.18
Status affected
Version 0
Version < 4.18
Status unaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.112
Status unaffected
Version <= 6.12.*
Version 6.12.53
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.181
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.