-
CVE-2025-40183
- EPSS 0.06%
- Veröffentlicht 12.11.2025 21:56:27
- Zuletzt bearbeitet 14.11.2025 16:42:30
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
Cilium has a BPF egress gateway feature which forces outgoing K8s Pod
traffic to pass through dedicated egress gateways which then SNAT the
traffic in order to interact with stable IPs outside the cluster.
The traffic is directed to the gateway via vxlan tunnel in collect md
mode. A recent BPF change utilized the bpf_redirect_neigh() helper to
forward packets after the arrival and decap on vxlan, which turned out
over time that the kmalloc-256 slab usage in kernel was ever-increasing.
The issue was that vxlan allocates the metadata_dst object and attaches
it through a fake dst entry to the skb. The latter was never released
though given bpf_redirect_neigh() was merely setting the new dst entry
via skb_dst_set() without dropping an existing one first.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
3fba965a9aac0fa3cbd8138436a37af9ab466d79
Version
b4ab31414970a7a03a5d55d75083f2c101a30592
Status
affected
Version <
057764172fcc6ee2ccb6c41351a55a9f054dc8fd
Version
b4ab31414970a7a03a5d55d75083f2c101a30592
Status
affected
Version <
2e67c2037382abb56497bb9d7b7e10be04eb5598
Version
b4ab31414970a7a03a5d55d75083f2c101a30592
Status
affected
Version <
b6bfe44b6dbb14a31d86c475cdc9c7689534fb09
Version
b4ab31414970a7a03a5d55d75083f2c101a30592
Status
affected
Version <
f36a305d30f557306d87c787ddffe094ac5dac89
Version
b4ab31414970a7a03a5d55d75083f2c101a30592
Status
affected
Version <
7404ce888a45eb7da0508b7cbbe6f2e95302eeb8
Version
b4ab31414970a7a03a5d55d75083f2c101a30592
Status
affected
Version <
23f3770e1a53e6c7a553135011f547209e141e72
Version
b4ab31414970a7a03a5d55d75083f2c101a30592
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.10
Status
affected
Version <
5.10
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.246
Status
unaffected
Version <=
5.15.*
Version
5.15.195
Status
unaffected
Version <=
6.1.*
Version
6.1.157
Status
unaffected
Version <=
6.6.*
Version
6.6.113
Status
unaffected
Version <=
6.12.*
Version
6.12.54
Status
unaffected
Version <=
6.17.*
Version
6.17.4
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.193 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|