CVE-2025-40041Linux vulnerability

8 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 92.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 28
Latest updateFeb 17

Description

In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign-extend struct ops return values properly The ns_bpf_qdisc selftest triggers a kernel panic: Oops[#1]: CPU 0 Unable to handle kernel paging request at virtual address 0000000000741d58, era == 90000000851b5ac0, ra == 90000000851b5aa4 CPU: 0 UID: 0 PID: 449 Comm: test_progs Tainted: G OE 6.16.0+ #3 PREEMPT(full) Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: QEMU QEMU Virtual Machine, BIOS unkno

Affected Packages3 packages

Linuxlinux/linux_kernel6.17.06.17.3
CVEListV5linux/linux6abf17d690d83d25f6d00a1a2cd3553c7d20c2d89f3169bb3c2967166b4f4433cf152a84f3eb95d0+2
debiandebian/linux

🔴Vulnerability Details

4
OSV
linux-oem-6.17 vulnerabilities2026-02-17
OSV
LoongArch: BPF: Sign-extend struct ops return values properly2025-10-28
OSV
CVE-2025-40041: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign-extend struct ops return values properly The ns_bpf_qdisc sel2025-10-28
GHSA
GHSA-2v3w-2h39-x8cq: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign-extend struct ops return values properly The ns_bpf_qdisc s2025-10-28

📋Vendor Advisories

3
Ubuntu
Linux kernel (OEM) vulnerabilities2026-02-17
Red Hat
kernel: LoongArch: BPF: Sign-extend struct ops return values properly2025-10-28
Debian
CVE-2025-40041: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ...2025