CVE-2026-43038
Memory Corruption in Linux Kernel IPv6 ICMP Error Handling
Publication date: 2026-05-01
Last updated on: 2026-05-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by a patch that clears the skb2->cb[] array in the ip6_err_gen_icmpv6_unreach() function in the Linux kernel.
Immediate mitigation steps would involve updating the Linux kernel to a version that includes this patch to prevent the vulnerability from being exploited.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's handling of IPv6 ICMP error packets. Specifically, in the function ip6_err_gen_icmpv6_unreach(), a cloned packet skb2 is passed to icmp6_send() where its control buffer (cb) is misinterpreted. The cb originally contains IPv4 parameters but is treated as IPv6 parameters, causing overlapping fields to be misread.
An attacker can send a forged ICMPv4 error packet with a CIPSO IP option, which sets a non-zero offset in the overlapping field. This leads to the function mip6_addr_swap() scanning attacker-controlled data without proper length checks, potentially causing it to read or write beyond the packet boundary into sensitive kernel memory.
The vulnerability arises because the skb2->cb[] array is not cleared before reuse, allowing this misinterpretation and unsafe memory operations. The patch fixes this by clearing the cb array in ip6_err_gen_icmpv6_unreach() to prevent such misuse.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to cause memory corruption in the Linux kernel by sending specially crafted ICMPv4 error packets with CIPSO IP options. The memory corruption could lead to undefined behavior such as kernel crashes, denial of service, or potentially privilege escalation if exploited further.
Because the vulnerability involves reading and writing beyond intended memory boundaries, it could compromise system stability and security, impacting any system running a vulnerable Linux kernel.