CVE-2026-43114
netfilter nft_set_pipapo_avx2 expiry entry mismatch
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's netfilter component, specifically in the nft_set_pipapo_avx2 matching functions. When using avx2 instructions, the function incorrectly returns a non-matching entry upon expiry of elements in a set. During a reload of a pipapo set after a flush, the avx2 matching function mistakenly identifies an already reinserted but invalidated element as a clash due to improper masking and an early return in the matching process. This causes the function to skip valid elements and return incorrect matches, which does not happen in the generic implementation or fallback functions.
How can this vulnerability impact me? :
The vulnerability can cause incorrect behavior in netfilter's set matching operations, leading to false detection of clashing elements when reloading sets. This may result in failures or unexpected errors in firewall or packet filtering rules that rely on these sets, potentially disrupting network traffic filtering or security policies.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to the Linux kernel's netfilter nft_set_pipapo_avx2 matching functions, specifically when using avx2 instructions with nft sets involving 'ipv4 . port' keys.
To detect this issue, you can attempt to reproduce the test case described in the vulnerability: first load a randomly generated pipapo set with the command 'nft -f foo', then flush and reload the set using '(echo flush set t s; cat foo) | nft -f -'.
If the vulnerability is present, the reload will fail with nft reporting a clashing element, indicating the avx2 matching function is incorrectly handling entries.
- Load the set: nft -f foo
- Flush and reload the set: (echo flush set t s; cat foo) | nft -f -
Observing a clash error during the reload step suggests the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by fixing the avx2 matching functions to correctly handle entry expiry and avoid returning non-matching entries.
Immediate mitigation steps include updating your Linux kernel to a version that contains the fix for this issue.
Until the update is applied, avoid using nft sets with avx2 matching functions that involve 'ipv4 . port' keys in scenarios where sets are flushed and reloaded, as this triggers the bug.