CVE-2026-43040
Awaiting Analysis Awaiting Analysis - Queue
IPv6 Router Advertisement Info-Leak in Linux Kernel

Publication date: 2026-05-01

Last updated on: 2026-05-01

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak When processing Router Advertisements with user options the kernel builds an RTM_NEWNDUSEROPT netlink message. The nduseroptmsg struct has three padding fields that are never zeroed and can leak kernel data The fix is simple, just zeroes the padding fields.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-01
Last Modified
2026-05-01
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's IPv6 Neighbor Discovery (ndisc) component. Specifically, when processing Router Advertisements that include user options, the kernel constructs a netlink message (RTM_NEWNDUSEROPT) using a structure called nduseroptmsg. This structure contains three padding fields that were not initialized to zero, which could lead to leakage of kernel memory data.

The vulnerability is fixed by ensuring these padding fields are zeroed out before use, preventing any unintended information disclosure.


How can this vulnerability impact me? :

This vulnerability can lead to an information leak where sensitive kernel memory data might be exposed through uninitialized padding fields in netlink messages. An attacker could potentially use this leaked information to gain insights into the kernel's memory layout or other sensitive data, which might aid in further attacks or exploitation.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed by zeroing the padding fields in the nduseroptmsg struct when processing Router Advertisements with user options.

To mitigate this vulnerability immediately, update your Linux kernel to a version that includes this fix.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart