CVE-2026-43306
BPF Crypto Context Release Type Mismatch in Linux Kernel
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's BPF (Berkeley Packet Filter) crypto subsystem. It involves the use of an incorrect destructor kernel function (kfunc) type when CONFIG_CFI (Control Flow Integrity) is enabled. The kernel enforces that indirect function calls must use a function pointer type matching the target function. A type mismatch was detected during BPF self-tests, causing a CFI failure and internal kernel error (Oops). The issue was that the function bpf_crypto_ctx_release was used with a void pointer argument, which the verifier did not accept. The fix involved adding a stub function with the correct type and registering it as the destructor kfunc.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes or internal errors due to type mismatches in function pointers when running BPF programs with CONFIG_CFI enabled. Such crashes can lead to system instability or denial of service conditions, impacting the reliability and availability of the affected Linux system.