CVE-2026-43026
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2026
Last modified:
08/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent<br />
<br />
ctnetlink_alloc_expect() allocates expectations from a non-zeroing<br />
slab cache via nf_ct_expect_alloc(). When CTA_EXPECT_NAT is not<br />
present in the netlink message, saved_addr and saved_proto are<br />
never initialized. Stale data from a previous slab occupant can<br />
then be dumped to userspace by ctnetlink_exp_dump_expect(), which<br />
checks these fields to decide whether to emit CTA_EXPECT_NAT.<br />
<br />
The safe sibling nf_ct_expect_init(), used by the packet path,<br />
explicitly zeroes these fields.<br />
<br />
Zero saved_addr, saved_proto and dir in the else branch, guarded<br />
by IS_ENABLED(CONFIG_NF_NAT) since these fields only exist when<br />
NAT is enabled.<br />
<br />
Confirmed by priming the expect slab with NAT-bearing expectations,<br />
freeing them, creating a new expectation without CTA_EXPECT_NAT,<br />
and observing that the ctnetlink dump emits a spurious<br />
CTA_EXPECT_NAT containing stale data from the prior allocation.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.4 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1c2ebdeff8d088a2e47ae25d7b38447249adace2
- https://git.kernel.org/stable/c/2898080c054ea4d6ddfaaf21bbedbc229a9a8376
- https://git.kernel.org/stable/c/35177c6877134a21315f37d57a5577846225623e
- https://git.kernel.org/stable/c/929f7a9a7aad9404a5867216c3f8738232355b38
- https://git.kernel.org/stable/c/a5a89db6981a1ddf2314bf50cb49db5a3146185f
- https://git.kernel.org/stable/c/a64b7bf84b4d5ea54218c5d374ec87fff9000f43
- https://git.kernel.org/stable/c/bff0f4f06f12d6d9bc565a3e1378abd4f6f5ce36
- https://git.kernel.org/stable/c/fd002ff2ea030cbfb0188a11b3c60ce7f84485f4



