CVE-2026-23417Reliance on Untrusted Inputs in a Security Decision in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 93.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix constant blinding for PROBE_MEM32 stores BPF_ST | BPF_PROBE_MEM32 immediate stores are not handled by bpf_jit_blind_insn(), allowing user-controlled 32-bit immediates to survive unblinded into JIT-compiled native code when bpf_jit_harden >= 1. The root cause is that convert_ctx_accesses() rewrites BPF_ST|BPF_MEM to BPF_ST|BPF_PROBE_MEM32 for arena pointer stores during verification, before bpf_jit_blind_constants() r

Affected Packages2 packages

CVEListV5linux/linux6082b6c328b5486da2b356eae94b8b83c98b556556af722756ed82fee2ae5d5b4d04743407506195+4
debiandebian/linux< linux 6.19.11-1 (sid)

🔴Vulnerability Details

3
OSV
CVE-2026-23417: (In the Linux kernel, the following vulnerability has been resolved: b2026-04-03
OSV
CVE-2026-23417: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix constant blinding for PROBE_MEM32 stores BPF_ST | BPF_PROBE_MEM32 immedia2026-04-02
GHSA
GHSA-3j46-wx9h-x693: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix constant blinding for PROBE_MEM32 stores BPF_ST | BPF_PROBE_MEM32 immed2026-04-02

📋Vendor Advisories

2
Red Hat
kernel: bpf: Fix constant blinding for PROBE_MEM32 stores2026-04-02
Debian
CVE-2026-23417: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix co...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23417 Impact, Exploitability, and Mitigation Steps | Wiz