CVE-2026-43100
NULL Pointer Dereference in Linux Kernel Bridge Module
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's bridge networking code. When VLAN filtering is disabled (CONFIG_BRIDGE_VLAN_FILTERING not set), certain functions return NULL pointers for VLAN groups. However, some code paths still attempt to dereference these NULL pointers, leading to a crash (general protection fault). Specifically, the issue occurs in functions handling local VLAN-0 forwarding database (FDB) entries, where NULL vlan group pointers are dereferenced without proper checks.
The problem manifests when creating a bridge with a specific option (BR_BOOLOPT_FDB_LOCAL_VLAN_0) via a network link message, causing a kernel crash due to null pointer dereference. The fix involved adding NULL checks to these helper functions to prevent dereferencing NULL pointers.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when certain bridge configurations are applied, leading to a denial of service. Systems using bridging without VLAN filtering enabled and applying the affected options may experience instability or downtime due to these crashes.