Home

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Properly mark live registers for indirect jumps For a `gotox rX` instruction the rX register should be marked as used in the compute_insn_live_regs() function. Fix this.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-08 | Updated 2026-05-08 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before df02c3ff3be4bf998812c8c8e79d10db1329d535
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7beae54111c34ca63357ef120e115889b915beb5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d1aab1ca576c90192ba961094d51b0be6355a4d6
affected

Default status
affected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/df02c3ff3be4bf998812c8c8e79d10db1329d535

git.kernel.org/...c/7beae54111c34ca63357ef120e115889b915beb5

git.kernel.org/...c/d1aab1ca576c90192ba961094d51b0be6355a4d6

cve.org (CVE-2026-43321)

nvd.nist.gov (CVE-2026-43321)

Download JSON