๐Ÿ” CVE Alert

CVE-2026-31525

UNKNOWN 0.0

bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN The BPF interpreter's signed 32-bit division and modulo handlers use the kernel abs() macro on s32 operands. The abs() macro documentation (include/linux/math.h) explicitly states the result is undefined when the input is the type minimum. When DST contains S32_MIN (0x80000000), abs((s32)DST) triggers undefined behavior and returns S32_MIN unchanged on arm64/x86. This value is then sign-extended to u64 as 0xFFFFFFFF80000000, causing do_div() to compute the wrong result. The verifier's abstract interpretation (scalar32_min_max_sdiv) computes the mathematically correct result for range tracking, creating a verifier/interpreter mismatch that can be exploited for out-of-bounds map value access. Introduce abs_s32() which handles S32_MIN correctly by casting to u32 before negating, avoiding signed overflow entirely. Replace all 8 abs((s32)...) call sites in the interpreter's sdiv32/smod32 handlers. s32 is the only affected case -- the s64 division/modulo handlers do not use abs().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ec0e2da95f72d4a46050a4d994e4fe471474fd80 < 694ea55f1b1c74f9942d91ec366ae9e822422e42 ec0e2da95f72d4a46050a4d994e4fe471474fd80 < 9ab1227765c446942f290c83382f0b19887c55cf ec0e2da95f72d4a46050a4d994e4fe471474fd80 < f14ca604c0ff274fba19f73f1f0485c0047c1396 ec0e2da95f72d4a46050a4d994e4fe471474fd80 < 0d5d8c3ce45c734aaf3c51cbef59155a6746157d ec0e2da95f72d4a46050a4d994e4fe471474fd80 < c77b30bd1dcb61f66c640ff7d2757816210c7cb0
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/694ea55f1b1c74f9942d91ec366ae9e822422e42 git.kernel.org: https://git.kernel.org/stable/c/9ab1227765c446942f290c83382f0b19887c55cf git.kernel.org: https://git.kernel.org/stable/c/f14ca604c0ff274fba19f73f1f0485c0047c1396 git.kernel.org: https://git.kernel.org/stable/c/0d5d8c3ce45c734aaf3c51cbef59155a6746157d git.kernel.org: https://git.kernel.org/stable/c/c77b30bd1dcb61f66c640ff7d2757816210c7cb0