VYPR
Unrated severityNVD Advisory· Published Oct 28, 2025· Updated Apr 15, 2026

CVE-2025-40078

CVE-2025-40078

Description

In the Linux kernel, the following vulnerability has been resolved:

bpf: Explicitly check accesses to bpf_sock_addr

Syzkaller found a kernel warning on the following sock_addr program:

0: r0 = 0 1: r2 = *(u32 *)(r1 +60) 2: exit

which triggers:

verifier bug: error during ctx access conversion (0)

This is happening because offset 60 in bpf_sock_addr corresponds to an implicit padding of 4 bytes, right after msg_src_ip4. Access to this padding isn't rejected in sock_addr_is_valid_access and it thus later fails to convert the access.

This patch fixes it by explicitly checking the various fields of bpf_sock_addr in sock_addr_is_valid_access.

I checked the other ctx structures and is_valid_access functions and didn't find any other similar cases. Other cases of (properly handled) padding are covered in new tests in a subsequent patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing bounds check in the Linux kernel's BPF verifier for bpf_sock_addr allows out-of-bounds reads via padding fields, triggering a kernel warning.

Root

Cause

In the Linux kernel's BPF verifier, the sock_addr_is_valid_access function did not explicitly reject accesses to implicit padding fields in the bpf_sock_addr structure. Specifically, offset 60 corresponds to a 4-byte padding field located after msg_src_ip4. When a BPF program attempts to read from this offset, the verifier fails during context access conversion, leading to a kernel warning. [Description]

Exploitation

A local attacker with the ability to load and attach BPF sock_addr programs can craft a program that reads from offset 60 of the context. No special privileges beyond-normal privileges are required for such BPF operations, making the attack surface accessible to unprivileged users in some configurations. The syzkaller fuzzer reproduced this issue, demonstrating that the verifier does not properly sanitize field access, causing a kernel BUG or warning. [Description]

Impact

When triggered, the vulnerability results in a kernel warning and potentially a crash due to verifier bug, effectively causing a denial-of-service (DoS) condition on the affected system. While the kernel remains functional after a warning, repeated triggering degrades reliability and may escalate to a full system panic depending on the configuration.

Mitigation

Patches have been merged into the Linux kernel stable tree, as shown in commit references [1], [2], [3], and [4]. System administrators should apply the latest stable kernel updates from their distribution to resolve the issue. No workaround exists beyond restricting BPF access via kernel.unprivileged_bpf_disabled sysctl. [1][2][3][4]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.