-
CVE-2025-40350
- EPSS 0.03%
- Veröffentlicht 16.12.2025 13:30:23
- Zuletzt bearbeitet 18.12.2025 15:08:25
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ XDP programs can change the layout of an xdp_buff through bpf_xdp_adjust_tail() and bpf_xdp_adjust_head(). Therefore, the driver cannot assume the size of the linear data area nor fragments. Fix the bug in mlx5 by generating skb according to xdp_buff after XDP programs run. Currently, when handling multi-buf XDP, the mlx5 driver assumes the layout of an xdp_buff to be unchanged. That is, the linear data area continues to be empty and fragments remain the same. This may cause the driver to generate erroneous skb or triggering a kernel warning. When an XDP program added linear data through bpf_xdp_adjust_head(), the linear data will be ignored as mlx5e_build_linear_skb() builds an skb without linear data and then pull data from fragments to fill the linear data area. When an XDP program has shrunk the non-linear data through bpf_xdp_adjust_tail(), the delta passed to __pskb_pull_tail() may exceed the actual nonlinear data size and trigger the BUG_ON in it. To fix the issue, first record the original number of fragments. If the number of fragments changes after the XDP program runs, rewind the end fragment pointer by the difference and recalculate the truesize. Then, build the skb with the linear data area matching the xdp_buff. Finally, only pull data in if there is non-linear data and fill the linear part up to 256 bytes.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
8b051d7f530e8a5237da242fbeafef02fec6b813
Version
f52ac7028bec22e925c8fece4f21641eb13b4d6f
Status
affected
Version <
cb9edd583e23979ee546981be963ad5f217e8b18
Version
f52ac7028bec22e925c8fece4f21641eb13b4d6f
Status
affected
Version <
f2557d7fa38e9475b38588f5c124476091480f53
Version
f52ac7028bec22e925c8fece4f21641eb13b4d6f
Status
affected
Version <
87bcef158ac1faca1bd7e0104588e8e2956d10be
Version
f52ac7028bec22e925c8fece4f21641eb13b4d6f
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.4
Status
affected
Version <
6.4
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.115
Status
unaffected
Version <=
6.12.*
Version
6.12.56
Status
unaffected
Version <=
6.17.*
Version
6.17.6
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.063 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|