CVE-2025-40050 — Improper Handling of Unexpected Data Type in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 91.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 28
Latest updateFeb 24
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer
In check_alu_op(), the verifier currently calls check_reg_arg() and
adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations.
However, if the destination register holds a pointer, these scalar
adjustments are unnecessary and potentially incorrect.
This patch adds a check to skip the adjustment logic when the destination
register contains a pointer.
Affected Packages4 packages
▶CVEListV5linux/linuxaced132599b3c8884c050218d4c48eef203678f6 — b9ef4963227246b9222e1559ddeec8e7af63e6c6+2