Network Packet Processing Flaw in Linux Kernel's Virtio-net Module by Linux Foundation
CVE-2025-40292

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
8 December 2025

What is CVE-2025-40292?

A vulnerability exists in the Linux kernel's virtio-net module where the received length check for large packets is insufficient. This occurs due to a change in how packet buffer length is negotiated, potentially allowing a malicious host to announce a misleading buffer length. If exploited, this could lead to a NULL page pointer dereference, causing system instability or crashes. To mitigate this issue, a recent commit has adjusted the length check in the receive path, ensuring it aligns with the allocated buffer based on the negotiated MTU.

Affected Version(s)

Linux 4959aebba8c06992abafa09d1e80965e0825af54 < 82f9028e83944a9eee5229cbc6fee9be1de8a62d

Linux 4959aebba8c06992abafa09d1e80965e0825af54 < 946dec89c41726b94d31147ec528b96af0be1b5a

Linux 4959aebba8c06992abafa09d1e80965e0825af54 < 82fe78065450d2d07f36a22e2b6b44955cf5ca5b

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.