CVE-2025-40123

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-40123
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40123.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-40123
Downstream
Published
2025-11-12T10:23:19.589Z
Modified
2025-11-20T11:19:26.030469Z
Summary
bpf: Enforce expected_attach_type for tailcall compatibility
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Enforce expectedattachtype for tailcall compatibility

Yinhao et al. recently reported:

Our fuzzer tool discovered an uninitialized pointer issue in the bpfprogtestrunxdp() function within the Linux kernel's BPF subsystem. This leads to a NULL pointer dereference when a BPF program attempts to deference the txq member of struct xdp_buff object.

The test initializes two programs of BPFPROGTYPEXDP: progA acts as the entry point for bpfprogtestrunxdp() and its expectedattachtype can neither be of be BPFXDPDEVMAP nor BPFXDPCPUMAP. progA calls into a slot of a tailcall map it owns. progB's expectedattachtype must be BPFXDPDEVMAP to pass xdpisvalidaccess() validation. The program returns struct xdpmd's egressifindex, and the latter is only allowed to be accessed under mentioned expectedattachtype. progB is then inserted into the tailcall which progA calls.

The underlying issue goes beyond XDP though. Another example are programs of type BPFPROGTYPECGROUPSOCKADDR. sockaddrisvalidaccess() as well as sockaddrfuncproto() have different logic depending on the programs' expectedattachtype. Similarly, a program attached to BPFCGROUPINET4GETPEERNAME should not be allowed doing a tailcall into a program which calls bpfbind() out of BPF which is only enabled for BPFCGROUPINET4_CONNECT.

In short, specifying expectedattachtype allows to open up additional functionality or restrictions beyond what the basic bpfprogtype enables. The use of tailcalls must not violate these constraints. Fix it by enforcing expectedattachtype in _bpfprogmapcompatible().

Note that we only enforce this for tailcall maps, but not for BPF devmaps or cpumaps: There, the programs are invoked through devmapbpfprogrun() and cpu_map_bpf_prog_run() which set up a new environment / context and therefore these situations are not prone to this issue.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e43f899b03a3492ce5fc44e8900becb04dae9c0
Fixed
a99de19128aec0913f3d529f529fbbff5edfaff8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e43f899b03a3492ce5fc44e8900becb04dae9c0
Fixed
08cb3dc9d2b44f153d0bcf2cb966e4a94b5d0f32
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e43f899b03a3492ce5fc44e8900becb04dae9c0
Fixed
f856c598080ba7ce1252867b8ecd6ad5bdaf9a6a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e43f899b03a3492ce5fc44e8900becb04dae9c0
Fixed
c1ad19b5d8e23123503dcaf2d4342e1b90b923ad
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e43f899b03a3492ce5fc44e8900becb04dae9c0
Fixed
4540aed51b12bc13364149bf95f6ecef013197c0

Affected versions

v4.*

v4.16
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.100
v6.1.101
v6.1.102
v6.1.103
v6.1.104
v6.1.105
v6.1.106
v6.1.107
v6.1.108
v6.1.109
v6.1.11
v6.1.110
v6.1.111
v6.1.112
v6.1.113
v6.1.114
v6.1.115
v6.1.116
v6.1.117
v6.1.118
v6.1.119
v6.1.12
v6.1.120
v6.1.121
v6.1.122
v6.1.123
v6.1.124
v6.1.125
v6.1.126
v6.1.127
v6.1.128
v6.1.129
v6.1.13
v6.1.130
v6.1.131
v6.1.132
v6.1.133
v6.1.134
v6.1.135
v6.1.136
v6.1.137
v6.1.138
v6.1.139
v6.1.14
v6.1.140
v6.1.141
v6.1.142
v6.1.143
v6.1.144
v6.1.145
v6.1.146
v6.1.147
v6.1.148
v6.1.149
v6.1.15
v6.1.150
v6.1.151
v6.1.152
v6.1.153
v6.1.154
v6.1.155
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.9
v6.1.90
v6.1.91
v6.1.92
v6.1.93
v6.1.94
v6.1.95
v6.1.96
v6.1.97
v6.1.98
v6.1.99
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.12.26
v6.12.27
v6.12.28
v6.12.29
v6.12.3
v6.12.30
v6.12.31
v6.12.32
v6.12.33
v6.12.34
v6.12.35
v6.12.36
v6.12.37
v6.12.38
v6.12.39
v6.12.4
v6.12.40
v6.12.41
v6.12.42
v6.12.43
v6.12.44
v6.12.45
v6.12.46
v6.12.47
v6.12.48
v6.12.49
v6.12.5
v6.12.50
v6.12.51
v6.12.52
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.17.1
v6.17.2
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.100
v6.6.101
v6.6.102
v6.6.103
v6.6.104
v6.6.105
v6.6.106
v6.6.107
v6.6.108
v6.6.109
v6.6.11
v6.6.110
v6.6.111
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.46
v6.6.47
v6.6.48
v6.6.49
v6.6.5
v6.6.50
v6.6.51
v6.6.52
v6.6.53
v6.6.54
v6.6.55
v6.6.56
v6.6.57
v6.6.58
v6.6.59
v6.6.6
v6.6.60
v6.6.61
v6.6.62
v6.6.63
v6.6.64
v6.6.65
v6.6.66
v6.6.67
v6.6.68
v6.6.69
v6.6.7
v6.6.70
v6.6.71
v6.6.72
v6.6.73
v6.6.74
v6.6.75
v6.6.76
v6.6.77
v6.6.78
v6.6.79
v6.6.8
v6.6.80
v6.6.81
v6.6.82
v6.6.83
v6.6.84
v6.6.85
v6.6.86
v6.6.87
v6.6.88
v6.6.89
v6.6.9
v6.6.90
v6.6.91
v6.6.92
v6.6.93
v6.6.94
v6.6.95
v6.6.96
v6.6.97
v6.6.98
v6.6.99
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "target": {
            "file": "include/linux/bpf.h"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "160039346472224016724530682955901704728",
                "67932569583880726328739592002641527212",
                "103208946666404535511068387284442035358",
                "130940603169889615914395795578521908441"
            ]
        },
        "id": "CVE-2025-40123-08bcb14e",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@08cb3dc9d2b44f153d0bcf2cb966e4a94b5d0f32",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "288187228320051661731361574389365443952",
                "40956331780587493077976828851886175545",
                "118840202602181566830807405783201677431",
                "205176740695760663305309831834339773769",
                "259498773541604705216942691180761158525",
                "246019673612469815028860276490285665391",
                "77556166058055268372469681946142877607",
                "83970082315750208247834891343129724336"
            ]
        },
        "id": "CVE-2025-40123-2e47ea2b",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a99de19128aec0913f3d529f529fbbff5edfaff8",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "include/linux/bpf.h"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "160039346472224016724530682955901704728",
                "67932569583880726328739592002641527212",
                "103208946666404535511068387284442035358",
                "218867796303369466279053626721188975354"
            ]
        },
        "id": "CVE-2025-40123-4b2e56ca",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4540aed51b12bc13364149bf95f6ecef013197c0",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c",
            "function": "__bpf_prog_map_compatible"
        },
        "digest": {
            "length": 1389.0,
            "function_hash": "288816450732625747216389012155027779725"
        },
        "id": "CVE-2025-40123-4ce29a45",
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f856c598080ba7ce1252867b8ecd6ad5bdaf9a6a",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "288187228320051661731361574389365443952",
                "40956331780587493077976828851886175545",
                "118840202602181566830807405783201677431",
                "205176740695760663305309831834339773769",
                "259498773541604705216942691180761158525",
                "246019673612469815028860276490285665391",
                "77556166058055268372469681946142877607",
                "83970082315750208247834891343129724336"
            ]
        },
        "id": "CVE-2025-40123-51ffd8a1",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@08cb3dc9d2b44f153d0bcf2cb966e4a94b5d0f32",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "288187228320051661731361574389365443952",
                "40956331780587493077976828851886175545",
                "118840202602181566830807405783201677431",
                "205176740695760663305309831834339773769",
                "259498773541604705216942691180761158525",
                "246019673612469815028860276490285665391",
                "77556166058055268372469681946142877607",
                "83970082315750208247834891343129724336"
            ]
        },
        "id": "CVE-2025-40123-64d18c52",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c1ad19b5d8e23123503dcaf2d4342e1b90b923ad",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c",
            "function": "__bpf_prog_map_compatible"
        },
        "digest": {
            "length": 1389.0,
            "function_hash": "288816450732625747216389012155027779725"
        },
        "id": "CVE-2025-40123-78d24aa4",
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c1ad19b5d8e23123503dcaf2d4342e1b90b923ad",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "288187228320051661731361574389365443952",
                "40956331780587493077976828851886175545",
                "118840202602181566830807405783201677431",
                "205176740695760663305309831834339773769",
                "259498773541604705216942691180761158525",
                "246019673612469815028860276490285665391",
                "77556166058055268372469681946142877607",
                "83970082315750208247834891343129724336"
            ]
        },
        "id": "CVE-2025-40123-9a1be40d",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f856c598080ba7ce1252867b8ecd6ad5bdaf9a6a",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c",
            "function": "bpf_prog_map_compatible"
        },
        "digest": {
            "length": 1382.0,
            "function_hash": "324080147389871482819104760019766743015"
        },
        "id": "CVE-2025-40123-a0d39f26",
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a99de19128aec0913f3d529f529fbbff5edfaff8",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c",
            "function": "__bpf_prog_map_compatible"
        },
        "digest": {
            "length": 1389.0,
            "function_hash": "288816450732625747216389012155027779725"
        },
        "id": "CVE-2025-40123-b28a21e9",
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@08cb3dc9d2b44f153d0bcf2cb966e4a94b5d0f32",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "include/linux/bpf.h"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "160039346472224016724530682955901704728",
                "67932569583880726328739592002641527212",
                "103208946666404535511068387284442035358",
                "140731331404040609602729901380083730996"
            ]
        },
        "id": "CVE-2025-40123-b3528d4a",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f856c598080ba7ce1252867b8ecd6ad5bdaf9a6a",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c",
            "function": "__bpf_prog_map_compatible"
        },
        "digest": {
            "length": 1389.0,
            "function_hash": "288816450732625747216389012155027779725"
        },
        "id": "CVE-2025-40123-b6c264b6",
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4540aed51b12bc13364149bf95f6ecef013197c0",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "kernel/bpf/core.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "288187228320051661731361574389365443952",
                "40956331780587493077976828851886175545",
                "118840202602181566830807405783201677431",
                "205176740695760663305309831834339773769",
                "259498773541604705216942691180761158525",
                "246019673612469815028860276490285665391",
                "77556166058055268372469681946142877607",
                "83970082315750208247834891343129724336"
            ]
        },
        "id": "CVE-2025-40123-bed6190e",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4540aed51b12bc13364149bf95f6ecef013197c0",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "include/linux/bpf.h"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "160039346472224016724530682955901704728",
                "67932569583880726328739592002641527212",
                "103208946666404535511068387284442035358",
                "140731331404040609602729901380083730996"
            ]
        },
        "id": "CVE-2025-40123-dc750df5",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c1ad19b5d8e23123503dcaf2d4342e1b90b923ad",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "include/linux/bpf.h"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "160039346472224016724530682955901704728",
                "67932569583880726328739592002641527212",
                "103208946666404535511068387284442035358",
                "130940603169889615914395795578521908441"
            ]
        },
        "id": "CVE-2025-40123-e49a8af2",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a99de19128aec0913f3d529f529fbbff5edfaff8",
        "signature_version": "v1"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.17.0
Fixed
6.1.156
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.112
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.53
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.3