Impact
The vulnerability exploits undefined behavior in the Linux kernel’s eBPF interpreter when performing signed 32‑bit division or modulo on the INT_MIN value. The interpreter uses the abs() macro on that value, producing an undefined result that causes the division to compute an incorrect quotient. This mismatch between the interpreter and the verifier’s abstract interpretation creates an out‑of‑bounds map access path, which is inferred to potentially enable data leakage or denial of service.
Affected Systems
All Linux kernel releases prior to the introduction of the abs_s32 helper in the eBPF interpreter are affected. The code impact lies in the sdiv32 and smod32 handlers for signed 32‑bit operations. No specific release ranges are listed, so any kernel version lacking this patch remains vulnerable.
Risk and Exploitability
The CVSS base score of 7.8 indicates high severity. EPSS score indicates a very low exploitation probability (<1%) and the vulnerability is not listed in CISA’s KEV catalog. The flaw permits an out‑of‑bounds memory access path in the BPF interpreter when a signed 32‑bit division or modulo is performed with the INT_MIN value. The exact attack vector is not explicitly documented, but based on the description it is inferred that a malicious eBPF program that exercises the affected operation could trigger the error. The ability to load such a program is typically restricted to privileged users, so the threat is limited to environments where untrusted BPF code can be introduced. Administrators should treat the potential memory corruption as a high‑risk issue.
OpenCVE Enrichment
Debian DSA