Always-Incorrect Control Flow Implementation in Linux kernel - CVE-2026-43057

 

Always-Incorrect Control Flow Implementation in Linux kernel - CVE-2026-43057

Published: May 2, 2026


Vulnerability identifier: #VU128857
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-43057
CWE-ID: CWE-670
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to cause a denial of service.

The vulnerability exists due to improper handling of checksum offload fallback in the IPv6 GSO fallback logic when processing tunneled IPv6 traffic with extension headers or without an inner IP protocol. A local user can send specially crafted packets to cause a denial of service.

The issue affects tunneled traffic, including cases where the inner header rather than the outer network header must be validated.


How to mitigate CVE-2026-43057

Install security update from vendor's repository.

Sources