CVE-2025-40041 — Linux vulnerability
8 documents6 sources
Severity
—N/A
No vectorEPSS
0.0%
top 92.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 28
Latest updateFeb 17
Description
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: Sign-extend struct ops return values properly
The ns_bpf_qdisc selftest triggers a kernel panic:
Oops[#1]:
CPU 0 Unable to handle kernel paging request at virtual address 0000000000741d58, era == 90000000851b5ac0, ra == 90000000851b5aa4
CPU: 0 UID: 0 PID: 449 Comm: test_progs Tainted: G OE 6.16.0+ #3 PREEMPT(full)
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU QEMU Virtual Machine, BIOS unkno…
Affected Packages3 packages
▶CVEListV5linux/linux6abf17d690d83d25f6d00a1a2cd3553c7d20c2d8 — 9f3169bb3c2967166b4f4433cf152a84f3eb95d0+2
🔴Vulnerability Details
4OSV▶
CVE-2025-40041: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign-extend struct ops return values properly The ns_bpf_qdisc sel↗2025-10-28
GHSA▶
GHSA-2v3w-2h39-x8cq: In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: Sign-extend struct ops return values properly
The ns_bpf_qdisc s↗2025-10-28