CVE-2025-40050
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
28/10/2025
Última modificación:
30/10/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer<br />
<br />
In check_alu_op(), the verifier currently calls check_reg_arg() and<br />
adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations.<br />
However, if the destination register holds a pointer, these scalar<br />
adjustments are unnecessary and potentially incorrect.<br />
<br />
This patch adds a check to skip the adjustment logic when the destination<br />
register contains a pointer.



