PT-2026-34431 · Linux · Linux Kernel
Published
2026-04-22
·
Updated
2026-04-22
·
CVE-2026-31526
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
An issue exists in the
process bpf exit full() function where check lock is set to !curframe when calling check resource leak(). In cases where bpf throw() is called from a static subprog, this value becomes false, causing the system to skip the validation of active rcu locks, active preempt locks, and active irq id during exception exits from subprogs. Consequently, bpf throw() unwinds the stack via ORC without releasing user-acquired locks, which can lead to various system issues.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel