CVE-2026-43030
BPF Pointer Range Validation Fix in Linux Kernel
Publication date: 2026-05-01
Last updated on: 2026-05-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's BPF (Berkeley Packet Filter) subsystem. It involves a bug in the regsafe() function, which is responsible for validating pointers to packet data. Specifically, when certain conditions about register ranges are met (rold->reg->range == BEYOND_PKT_END and rcur->reg->range == N), regsafe() may incorrectly return true. This means the function might consider an invalid packet range as valid, potentially leading to incorrect handling of packet data.
How can this vulnerability impact me? :
Because regsafe() may incorrectly validate pointers to packet data, this could lead to the kernel not properly exploring the current state with a valid packet range. This might result in unexpected behavior or security issues related to packet processing, such as incorrect packet filtering or potential exploitation by attackers manipulating packet data.