CVE-2026-43025
Buffer Overflow in Linux Kernel Netfilter
Publication date: 2026-05-01
Last updated on: 2026-05-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's netfilter component, specifically in the ctnetlink module. It involves improper handling of explicit helpers on new expectations. Instead of using the existing master conntrack helper, the kernel was accepting other helpers suggested by userspace, which are not properly supported and complicate validation.
This flaw was discovered when validating CTA_EXPECT_CLASS with a helper provided by userspace that differed from the master conntrack helper, leading to a kernel memory read out-of-bounds error (KASAN slab-out-of-bounds). This means the kernel could read memory beyond the expected boundary, potentially causing instability or information leakage.
How can this vulnerability impact me? :
The vulnerability allows the Linux kernel to read kernel memory bytes beyond the intended boundary due to improper validation of helpers in netfilter's conntrack expectations.
This out-of-bounds read could lead to kernel instability, crashes, or potentially expose sensitive kernel memory contents to an attacker, which may be leveraged for further attacks or information disclosure.