| Summary | In the Linux kernel, the following vulnerability has been resolved: bpf: Reset register ID for BPF_END value tracking When a register undergoes a BPF_END (byte swap) operation, its scalar Currently, the verifier misses resetting `dst_reg->id` to 0 for BPF_END. Fix this by explicitly resetting `dst_reg->id` to 0 in the BPF_END case |
|---|---|
| Publication Date | May 6, 2026, 1:16 a.m. |
| Registration Date | May 6, 2026, 4:07 a.m. |
| Last Update | May 6, 2026, 1:16 a.m. |