CVE-2026-43030
Awaiting Analysis Awaiting Analysis - Queue
BPF Pointer Range Validation Fix in Linux Kernel

Publication date: 2026-05-01

Last updated on: 2026-05-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix regsafe() for pointers to packet In case rold->reg->range == BEYOND_PKT_END && rcur->reg->range == N regsafe() may return true which may lead to current state with valid packet range not being explored. Fix the bug.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-01
Last Modified
2026-05-03
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's BPF (Berkeley Packet Filter) subsystem. It involves a bug in the regsafe() function, which is responsible for validating pointers to packet data. Specifically, when certain conditions about register ranges are met (rold->reg->range == BEYOND_PKT_END and rcur->reg->range == N), regsafe() may incorrectly return true. This means the function might consider an invalid packet range as valid, potentially leading to incorrect handling of packet data.


How can this vulnerability impact me? :

Because regsafe() may incorrectly validate pointers to packet data, this could lead to the kernel not properly exploring the current state with a valid packet range. This might result in unexpected behavior or security issues related to packet processing, such as incorrect packet filtering or potential exploitation by attackers manipulating packet data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart