← Voltar para CVEs
CVE-2025-40050
N/ADescricao
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer, these scalar adjustments are unnecessary and potentially incorrect. This patch adds a check to skip the adjustment logic when the destination register contains a pointer.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado10/28/2025
Ultima modificacao10/30/2025
Fontenvd
Avistamentos honeypot0
Referencias
https://git.kernel.org/stable/c/34904582b502a86fdb4d7984b12cacd2faabbe0d(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/b9ef4963227246b9222e1559ddeec8e7af63e6c6(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.