VYPR
High severity7.3NVD Advisory· Published May 1, 2026· Updated May 8, 2026

CVE-2026-43025

CVE-2026-43025

Description

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: ignore explicit helper on new expectations

Use the existing master conntrack helper, anything else is not really supported and it just makes validation more complicated, so just ignore what helper userspace suggests for this expectation.

This was uncovered when validating CTA_EXPECT_CLASS via different helper provided by userspace than the existing master conntrack helper:

BUG: KASAN: slab-out-of-bounds in nf_ct_expect_related_report+0x2479/0x27c0 Read of size 4 at addr ffff8880043fe408 by task poc/102 Call Trace: nf_ct_expect_related_report+0x2479/0x27c0 ctnetlink_create_expect+0x22b/0x3b0 ctnetlink_new_expect+0x4bd/0x5c0 nfnetlink_rcv_msg+0x67a/0x950 netlink_rcv_skb+0x120/0x350

Allowing to read kernel memory bytes off the expectation boundary.

CTA_EXPECT_HELP_NAME is still used to offer the helper name to userspace via netlink dump.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, ctnetlink ignores explicit helper on new expectations to fix a KASAN slab-out-of-bounds bug allowing kernel memory read.

Root

Cause

In the Linux kernel's netfilter subsystem, the function ctnetlink_create_expect in ctnetlink allowed userspace to specify a helper via CTA_EXPECT_HELP_NAME when creating an expectation. This helper differs from the master conntrack helper, leading to a validation mismatch. The issue was uncovered when CTA_EXPECT_CLASS was validated against the userspace-supplied helper, causing a slab-out-of-bounds read in nf_ct_expect_related_report, as shown in the KASAN report [1].

Exploitation

An attacker with the ability to send crafted netlink messages (requires CAP_NET_ADMIN) can supply) to the NFNL_SUBSYS_CTNETLINK subsystem can supply a helper name that differs from the master conntrack helper. This triggers an out-of-bounds memory read, allowing the attacker to read bytes beyond the expectation boundary [2].

Impact

A successful exploit results in reading kernel heap memory outside the allocated expectation structure, potentially leaking sensitive information. The CVSS v3 score of 7.3 indicates a high severity due to the potential for information disclosure [3].

Mitigation

The fix, backported to stable kernels, simply ignores the userspace-supplied helper name when creating expectations, mandating the use of the master conntrack helper. CTA_EXPECT_HELP_NAME is still used for dumping helper names to userspace, so no functionality is lost. Patches are available from the kernel stable tree [4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Linux/Kernelinferred9 versions
    (expand)+ 8 more
    • (no CPE)
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=3.12,<6.1.168
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

News mentions

0

No linked articles in our index yet.