PatchSiren cyber security CVE debrief
CVE-2026-43321 Git CVE debrief
CVE-2026-43321 is a Linux kernel BPF verifier bug in indirect-jump live-register tracking. The issue was resolved by ensuring the target register in a `gotox rX` instruction is marked as used during `compute_insn_live_regs()`. Because the flaw affects kernel-level BPF analysis and carries a CVSS 7.8 High rating, it should be treated as a priority kernel security fix.
- Vendor
- Git
- Product
- Unknown
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-08
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-08
- Advisory updated
- 2026-05-11
Who should care
Linux kernel maintainers, distro security teams, and operators of systems that rely on eBPF/BPF features should pay close attention, especially where kernel updates are centrally managed or delayed.
Technical summary
According to the CVE description, `compute_insn_live_regs()` did not properly mark the register used by a `gotox rX` indirect jump as live. That can cause incorrect register-liveness tracking in the BPF verifier path. The source references point to Linux kernel stable commit records that address the issue.
Defensive priority
High. This is a kernel-level flaw with local attack requirements and high CVSS impact across confidentiality, integrity, and availability.
Recommended defensive actions
- Apply the Linux kernel fix referenced by the stable commit links in the source corpus.
- Prioritize backporting or distribution updates that include the corrected BPF live-register handling.
- Verify affected kernels in fleet inventories, especially systems that expose BPF functionality to local users or workloads.
- Track the CVE and NVD records for any update to affected version ranges or remediation notes.
Evidence notes
The only supported technical details in the supplied corpus are the CVE description and the NVD reference metadata. The description states that live-register tracking in `compute_insn_live_regs()` failed to mark `rX` as used for `gotox rX`, and the NVD record cites two Linux kernel stable commit URLs as references. No exploit narrative, affected version list, or weaponized reproduction details were provided in the corpus.
Official resources
-
CVE-2026-43321 CVE record
CVE.org
-
CVE-2026-43321 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVE published on 2026-05-08 and modified on 2026-05-11. Use the published date for timing context; no separate exploit disclosure timeline was provided in the supplied corpus. The NVD record was in Received status at the time of the source.