Out-of-bounds read in Linux kernel - CVE-2026-43025
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote user to disclose sensitive information.
The vulnerability exists due to an out-of-bounds read in the ctnetlink expectation handling code when processing netlink requests that create expectations with a helper different from the existing master conntrack helper. A remote user can send a specially crafted netlink request to disclose sensitive information.
The issue can allow reading kernel memory bytes beyond the expectation boundary.
How to mitigate CVE-2026-43025
Sources
- https://git.kernel.org/stable/c/0f6c33697ccfac6499d0b7a4dbdec5d3a3a566cd
- https://git.kernel.org/stable/c/187b6ec5229ea93cb04c4f6d3b52efc80f513d0d
- https://git.kernel.org/stable/c/21a04c31db4057deec85fcd6cc63d720b38819c3
- https://git.kernel.org/stable/c/2ea0f35f235f70c133ad61fe05ba013753b978c6
- https://git.kernel.org/stable/c/917b61fa2042f11e2af4c428e43f08199586633a
- https://git.kernel.org/stable/c/e135f8e8212cbed12a03ab8dec77fa1247139897