CVE-2026-43011

Severity CVSS v4.0:
Pending analysis
Type:
CWE-415 Double Free
Publication date:
01/05/2026
Last modified:
07/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/x25: Fix potential double free of skb<br /> <br /> When alloc_skb fails in x25_queue_rx_frame it calls kfree_skb(skb) at<br /> line 48 and returns 1 (error).<br /> This error propagates back through the call chain:<br /> <br /> x25_queue_rx_frame returns 1<br /> |<br /> v<br /> x25_state3_machine receives the return value 1 and takes the else<br /> branch at line 278, setting queued=0 and returning 0<br /> |<br /> v<br /> x25_process_rx_frame returns queued=0<br /> |<br /> v<br /> x25_backlog_rcv at line 452 sees queued=0 and calls kfree_skb(skb)<br /> again<br /> <br /> This would free the same skb twice. Looking at x25_backlog_rcv:<br /> <br /> net/x25/x25_in.c:x25_backlog_rcv() {<br /> ...<br /> queued = x25_process_rx_frame(sk, skb);<br /> ...<br /> if (!queued)<br /> kfree_skb(skb);<br /> }

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.12.1 (including) 5.10.253 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.203 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.134 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.81 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.12 (excluding)
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*