Home

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer, these scalar adjustments are unnecessary and potentially incorrect. This patch adds a check to skip the adjustment logic when the destination register contains a pointer.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-28 | Updated 2025-10-28 | Assigner Linux

Product status

Default status
unaffected

aced132599b3c8884c050218d4c48eef203678f6 (git) before b9ef4963227246b9222e1559ddeec8e7af63e6c6
affected

aced132599b3c8884c050218d4c48eef203678f6 (git) before 34904582b502a86fdb4d7984b12cacd2faabbe0d
affected

Default status
affected

6.17
affected

Any version before 6.17
unaffected

6.17.3 (semver)
unaffected

6.18-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/b9ef4963227246b9222e1559ddeec8e7af63e6c6

git.kernel.org/...c/34904582b502a86fdb4d7984b12cacd2faabbe0d

cve.org (CVE-2025-40050)

nvd.nist.gov (CVE-2025-40050)

Download JSON