CVE-2025-40350
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ
XDP programs can change the layout of an xdp_buff through bpf_xdp_adjust_tail() and bpf_xdp_adjust_head(). Therefore, the driver cannot assume the size of the linear data area nor fragments. Fix the bug in mlx5 by generating skb according to xdp_buff after XDP programs run.
Currently, when handling multi-buf XDP, the mlx5 driver assumes the layout of an xdp_buff to be unchanged. That is, the linear data area continues to be empty and fragments remain the same. This may cause the driver to generate erroneous skb or triggering a kernel warning. When an XDP program added linear data through bpf_xdp_adjust_head(), the linear data will be ignored as mlx5e_build_linear_skb() builds an skb without linear data and then pull data from fragments to fill the linear data area. When an XDP program has shrunk the non-linear data through bpf_xdp_adjust_tail(), the delta passed to __pskb_pull_tail() may exceed the actual nonlinear data size and trigger the BUG_ON in it.
To fix the issue, first record the original number of fragments. If the number of fragments changes after the XDP program runs, rewind the end fragment pointer by the difference and recalculate the truesize. Then, build the skb with the linear data area matching the xdp_buff. Finally, only pull data in if there is non-linear data and fill the linear part up to 256 bytes.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, a bug in mlx5e RX handling for striding RQ can cause erroneous skb generation or kernel warnings when XDP programs modify xdp_buff layout via bpf_xdp_adjust_tail/head.
Vulnerability
Overview
In the Linux kernel's net/mlx5e driver, a vulnerability exists in the RX path for striding RQ (Receive Queue) when handling multi-buffer XDP programs. The root cause is that the driver assumed the layout of an xdp_buff remains unchanged after XDP programs run, specifically that the linear data linear area and fragments. However, XDP programs can modify the layout via bpf_xdp_adjust_tail() and bpf_xdp_adjust_head() can modify the buffer layout, leading to incorrect skb generation or triggering kernel warnings like BUG_ON in __pskb_pull_tail(). [1]
Exploitation
An attacker with the ability to load a crafted XDP program onto a mlx5 network interface can exploit this vulnerability. The XDP program can adjust the head or tail of the xdp_buff, causing the driver to misinterpret the buffer layout. For example, if an XDP program adds linear data via bpf_xdp_adjust_head(), the driver's mlx5e_build_linear_skb() may ignore that linear data and later pull data and later pull data from fragments incorrectly. Similarly, shrinking non-linear data via bpf_xdp_adjust_tail() can cause the delta passed to __pskb_pull_tail() to exceed actual nonlinear data size, triggering a BUG_ON. [1]
Impact
Successful exploitation can lead to erroneous skb generation, potentially causing network packet corruption or denial of service via kernel panic (BUG_ON). The vulnerability). The impact is limited to systems using mlx5 network drivers with striding RQ and XDP programs that modify buffer layout. [1]
Mitigation
The fix is included in Linux kernel stable commit 8b051d7f530e8a5237da242fbeafef02fec6b813. The patch records the original number of fragments, adjusts fragment pointers and truesize if fragments change after XDP, builds skb with correct linear data area, and limits pull data to 256 bytes. Users should update to a kernel version containing this commit. [1]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
48b051d7f530ecb9edd583e23f2557d7fa38e87bcef158ac1Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.