Improper input validation in Linux kernel - CVE-2026-43024
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in nf_tables verdict handling when processing nftables rules. A local user can create a rule with an immediate NF_QUEUE verdict to cause a denial of service.
The issue is reachable in the arp family even though queue support is not provided there.
How to mitigate CVE-2026-43024
Sources
- https://git.kernel.org/stable/c/17dc5d5a935c771338430cbc156a16a51cfd31e8
- https://git.kernel.org/stable/c/2f7f825a548be55420f0f5f716f6c27b9d312d3f
- https://git.kernel.org/stable/c/42a47f4b1b7695026ab9bc1bb35d4622b0835c95
- https://git.kernel.org/stable/c/4b12a3cc3f075e750cc3c5e693fd25fb400af4a2
- https://git.kernel.org/stable/c/68390437a998c3f2c57212b413abef5e6d657d88
- https://git.kernel.org/stable/c/da107398cbd4bbdb6bffecb2ce86d5c9384f4cec
- https://git.kernel.org/stable/c/f140593901724cfbd16597c3a4fcb24a58ae44b0
- https://git.kernel.org/stable/c/f710691be163ae6b39e4bcab9e5be32d329f035b