Bug 2414511 (CVE-2025-40123)
| Summary: | CVE-2025-40123 kernel: bpf: Enforce expected_attach_type for tailcall compatibility | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A constraint validation bypass was found in the Linux kernel's BPF tailcall compatibility checking. A local user with BPF privileges can trigger this issue by creating two programs with mismatched expected_attach_type values where the entry program performs a tailcall into a target program that has permissions to access different context fields or helper functions. This causes NULL pointer dereferences or undefined behavior when the target program attempts operations only valid for its attach type, resulting in kernel crashes and denial of service.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2025-11-12 11:04:38 UTC
|