CVE-2025-40050Improper Handling of Unexpected Data Type in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 91.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 28
Latest updateFeb 24

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer, these scalar adjustments are unnecessary and potentially incorrect. This patch adds a check to skip the adjustment logic when the destination register contains a pointer.

Affected Packages4 packages

Linuxlinux/linux_kernel6.17.06.17.3
Ubuntulinux/linux_kernel< 6.17.0-14.14
CVEListV5linux/linuxaced132599b3c8884c050218d4c48eef203678f6b9ef4963227246b9222e1559ddeec8e7af63e6c6+2
debiandebian/linux

🔴Vulnerability Details

8
OSV
linux-azure vulnerabilities2026-02-24
OSV
linux-oem-6.17 vulnerabilities2026-02-17
OSV
linux-aws, linux-oracle vulnerabilities2026-02-17
OSV
linux-gcp vulnerabilities2026-02-12
OSV
linux, linux-raspi, linux-realtime vulnerabilities2026-02-12

📋Vendor Advisories

6
Ubuntu
Linux kernel (Azure) vulnerabilities2026-02-24
Ubuntu
Linux kernel (OEM) vulnerabilities2026-02-17
Ubuntu
Linux kernel (GCP) vulnerabilities2026-02-12
Ubuntu
Linux kernel vulnerabilities2026-02-12
Red Hat
kernel: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer2025-10-28