Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer, these scalar adjustments are unnecessary and potentially incorrect. This patch adds a check to skip the adjustment logic when the destination register contains a pointer.
Product status
aced132599b3c8884c050218d4c48eef203678f6 (git) before b9ef4963227246b9222e1559ddeec8e7af63e6c6
aced132599b3c8884c050218d4c48eef203678f6 (git) before 34904582b502a86fdb4d7984b12cacd2faabbe0d
6.17
Any version before 6.17
6.17.3 (semver)
6.18-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/b9ef4963227246b9222e1559ddeec8e7af63e6c6
git.kernel.org/...c/34904582b502a86fdb4d7984b12cacd2faabbe0d