PT-2026-32152 · Linux · Linux
Published
2026-04-12
·
Updated
2026-04-12
·
CVE-2026-31413
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix unsound scalar forking in maybe fork scalars() for BPF OR
maybe fork scalars() is called for both BPF AND and BPF OR when the
source operand is a constant. When dst has signed range [-1, 0], it
forks the verifier state: the pushed path gets dst = 0, the current
path gets dst = -1.
For BPF AND this is correct: 0 & K == 0.
For BPF OR this is wrong: 0 | K == K, not 0.
The pushed path therefore tracks dst as 0 when the runtime value is K,
producing an exploitable verifier/runtime divergence that allows
out-of-bounds map access.
Fix this by passing env->insn idx (instead of env->insn idx + 1) to
push stack(), so the pushed path re-executes the ALU instruction with
dst = 0 and naturally computes the correct result for any opcode.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux