๐Ÿ” CVE Alert

CVE-2025-39748

UNKNOWN 0.0

bpf: Forget ranges when refining tnum after JSET

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: Forget ranges when refining tnum after JSET Syzbot reported a kernel warning due to a range invariant violation on the following BPF program. 0: call bpf_get_netns_cookie 1: if r0 == 0 goto <exit> 2: if r0 & Oxffffffff goto <exit> The issue is on the path where we fall through both jumps. That path is unreachable at runtime: after insn 1, we know r0 != 0, but with the sign extension on the jset, we would only fallthrough insn 2 if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to figure this out, so the verifier walks all branches. The verifier then refines the register bounds using the second condition and we end up with inconsistent bounds on this unreachable path: 1: if r0 == 0 goto <exit> r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff) 2: if r0 & 0xffffffff goto <exit> r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0) r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0) Improving the range refinement for JSET to cover all cases is tricky. We also don't expect many users to rely on JSET given LLVM doesn't generate those instructions. So instead of improving the range refinement for JSETs, Eduard suggested we forget the ranges whenever we're narrowing tnums after a JSET. This patch implements that approach.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2025
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
960ea056561a08e2b837b2f02d22c53226414a84 < 591c788d16046edb0220800bf1819554af5853ce 960ea056561a08e2b837b2f02d22c53226414a84 < 0643aa2468192a4d81326e8e76543854870b1ee2 960ea056561a08e2b837b2f02d22c53226414a84 < f01e06930444cab289a8783017af9b64255bd103 960ea056561a08e2b837b2f02d22c53226414a84 < 2fd0c26bacd90ef26522bd3169000a4715bf151f 960ea056561a08e2b837b2f02d22c53226414a84 < 80a6b11862a7cfdf691e8f9faee89cfea219f098 960ea056561a08e2b837b2f02d22c53226414a84 < 6279846b9b2532e1b04559ef8bd0dec049f29383
Linux / Linux
5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/591c788d16046edb0220800bf1819554af5853ce git.kernel.org: https://git.kernel.org/stable/c/0643aa2468192a4d81326e8e76543854870b1ee2 git.kernel.org: https://git.kernel.org/stable/c/f01e06930444cab289a8783017af9b64255bd103 git.kernel.org: https://git.kernel.org/stable/c/2fd0c26bacd90ef26522bd3169000a4715bf151f git.kernel.org: https://git.kernel.org/stable/c/80a6b11862a7cfdf691e8f9faee89cfea219f098 git.kernel.org: https://git.kernel.org/stable/c/6279846b9b2532e1b04559ef8bd0dec049f29383