CVE-2026-43027
Use-After-Free in Linux Kernel Netfilter Conntrack Helper
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's netfilter component, specifically in the nf_conntrack_helper module. The issue arises because the function nf_conntrack_helper_unregister() calls nf_ct_expect_iterate_destroy() to remove expectations related to a helper being unregistered, but it incorrectly passes NULL instead of the actual helper pointer. As a result, the expectations are not properly cleaned up and remain after the helper is freed. Subsequent operations then dereference this freed helper pointer, causing a use-after-free error, which can lead to kernel crashes or other unpredictable behavior.
How can this vulnerability impact me? :
The vulnerability can cause a use-after-free condition in the Linux kernel, which may lead to system instability, crashes, or potential exploitation by attackers. Since the kernel dereferences freed memory, it could be manipulated to execute arbitrary code or cause denial of service, impacting the reliability and security of systems running vulnerable Linux kernel versions.