vulnerability

Huawei EulerOS: CVE-2025-40078: kernel security update

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Mar 16, 2026
Added
Mar 17, 2026
Modified
Apr 1, 2026

Description

In the Linux kernel, the following vulnerability has been resolved:

bpf: Explicitly check accesses to bpf_sock_addr

Syzkaller found a kernel warning on the following sock_addr program:

0: r0 = 0
1: r2 = *(u32 *)(r1 +60)
2: exit

which triggers:

verifier bug: error during ctx access conversion (0)

This is happening because offset 60 in bpf_sock_addr corresponds to an
implicit padding of 4 bytes, right after msg_src_ip4. Access to this
padding isn't rejected in sock_addr_is_valid_access and it thus later
fails to convert the access.

This patch fixes it by explicitly checking the various fields of
bpf_sock_addr in sock_addr_is_valid_access.

I checked the other ctx structures and is_valid_access functions and
didn't find any other similar cases. Other cases of (properly handled)
padding are covered in new tests in a subsequent patch.

Solutions

huawei-euleros-2_0_sp12-upgrade-bpftoolhuawei-euleros-2_0_sp12-upgrade-kernelhuawei-euleros-2_0_sp12-upgrade-kernel-abi-stablelistshuawei-euleros-2_0_sp12-upgrade-kernel-toolshuawei-euleros-2_0_sp12-upgrade-kernel-tools-libshuawei-euleros-2_0_sp12-upgrade-python3-perf
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.