CVE-2026-43321
Received Received - Intake
BPF Indirect Jump Register Marking Vulnerability in Linux Kernel

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Properly mark live registers for indirect jumps For a `gotox rX` instruction the rX register should be marked as used in the compute_insn_live_regs() function. Fix this.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux linux_kernel *
linux_kernel linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel relates to the handling of BPF (Berkeley Packet Filter) instructions, specifically the 'gotox rX' instruction. The issue was that the rX register was not properly marked as used in the compute_insn_live_regs() function, which is responsible for tracking live registers during indirect jumps. The fix ensures that the rX register is correctly marked as live, preventing potential errors in register usage.


How can this vulnerability impact me? :

Improper marking of live registers in BPF instructions could lead to incorrect behavior in the kernel's execution of BPF programs. This might cause unexpected crashes, incorrect packet filtering, or other unpredictable kernel behavior, potentially affecting system stability or security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart