๐Ÿ” CVE Alert

CVE-2025-40050

UNKNOWN 0.0

bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer, these scalar adjustments are unnecessary and potentially incorrect. This patch adds a check to skip the adjustment logic when the destination register contains a pointer.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 28, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
aced132599b3c8884c050218d4c48eef203678f6 < b9ef4963227246b9222e1559ddeec8e7af63e6c6 aced132599b3c8884c050218d4c48eef203678f6 < 34904582b502a86fdb4d7984b12cacd2faabbe0d
Linux / Linux
6.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b9ef4963227246b9222e1559ddeec8e7af63e6c6 git.kernel.org: https://git.kernel.org/stable/c/34904582b502a86fdb4d7984b12cacd2faabbe0d