CVE-2026-43186
Heap Buffer Overflow in Linux Kernel IPv6 IOAM
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's IPv6 ioam (In-situ OAM) feature, specifically in the function __ioam6_fill_trace_data(). The function uses a field called nodelen from incoming packets to determine how much data to write for each node, but it does not verify that nodelen is consistent with another field called type, which indicates which data items are present.
An attacker can craft a malicious packet that sets nodelen to 0 while setting certain bits in the type field, causing the function to write approximately 100 bytes beyond the allocated memory region. This leads to heap buffer overflow, corrupting adjacent memory and potentially causing a kernel panic.
The fix involves adding a helper function to compute the expected nodelen from the type field and dropping packets where nodelen is inconsistent with type before any data is written.
How can this vulnerability impact me? :
This vulnerability can lead to a heap buffer overflow in the Linux kernel, which may cause memory corruption and result in a kernel panic (system crash).
Exploitation of this flaw could disrupt system stability and availability, potentially causing denial of service conditions on affected systems.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by adding a consistency check on the nodelen field against the type field in the Linux kernel's ioam6 code. To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix.
Specifically, the fix involves dropping packets whose nodelen is inconsistent with the type field before any data is written, preventing heap buffer overflow and kernel panic.