CVE-2026-31413

ANALYSIS PENDING

bpf: Fix unsound scalar forking in maybe_fork_scalars() for BPF_OR

Title source: cna

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix unsound scalar forking in maybe_fork_scalars() for BPF_OR maybe_fork_scalars() is called for both BPF_AND and BPF_OR when the source operand is a constant. When dst has signed range [-1, 0], it forks the verifier state: the pushed path gets dst = 0, the current path gets dst = -1. For BPF_AND this is correct: 0 & K == 0. For BPF_OR this is wrong: 0 | K == K, not 0. The pushed path therefore tracks dst as 0 when the runtime value is K, producing an exploitable verifier/runtime divergence that allows out-of-bounds map access. Fix this by passing env->insn_idx (instead of env->insn_idx + 1) to push_stack(), so the pushed path re-executes the ALU instruction with dst = 0 and naturally computes the correct result for any opcode.

Exploits (1)

nomisec WORKING POC
by Rat5ak · poc
https://github.com/Rat5ak/CVE-2026-31413-BPF-Container-Escape

Scores

EPSS 0.0001
EPSS Percentile 1.1%

Details

Status published
Products (13)
Linux/Linux < 7.0-rc1
Linux/Linux 4c122e8ae14950cf6b59d208fc5160f7c601e746 - 58bd87d0e69204dbd739e4387a1edb0c4b1644e7
Linux/Linux 6.12.75 - 6.12.80
Linux/Linux 6.12.80 - 6.12.*
Linux/Linux 6.18.16 - 6.18.21
Linux/Linux 6.18.21 - 6.18.*
Linux/Linux 6.19.11 - 6.19.*
Linux/Linux 6.19.6 - 6.19.11
Linux/Linux 7.0-rc1
Linux/Linux 7.0-rc5
... and 3 more
Published Apr 12, 2026
Tracked Since Apr 12, 2026