VYPR
Medium severity5.5NVD Advisory· Published May 1, 2026· Updated May 8, 2026

CVE-2026-43026

CVE-2026-43026

Description

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent

ctnetlink_alloc_expect() allocates expectations from a non-zeroing slab cache via nf_ct_expect_alloc(). When CTA_EXPECT_NAT is not present in the netlink message, saved_addr and saved_proto are never initialized. Stale data from a previous slab occupant can then be dumped to userspace by ctnetlink_exp_dump_expect(), which checks these fields to decide whether to emit CTA_EXPECT_NAT.

The safe sibling nf_ct_expect_init(), used by the packet path, explicitly zeroes these fields.

Zero saved_addr, saved_proto and dir in the else branch, guarded by IS_ENABLED(CONFIG_NF_NAT) since these fields only exist when NAT is enabled.

Confirmed by priming the expect slab with NAT-bearing expectations, freeing them, creating a new expectation without CTA_EXPECT_NAT, and observing that the ctnetlink dump emits a spurious CTA_EXPECT_NAT containing stale data from the prior allocation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's netfilter ctnetlink, uninitialized expectation NAT fields can leak kernel memory to userspace when CTA_EXPECT_NAT is absent.

Vulnerability

CVE-2026-43026 is a kernel information disclosure vulnerability in the netfilter ctnetlink subsystem of the Linux kernel. The ctnetlink_alloc_expect() function allocates expectations from a non-zeroing slab cache via nf_ct_expect_alloc(). When CTA_EXPECT_NAT is not present in the netlink message, the saved_addr and saved_proto fields are never initialized, leaving stale data from a previous slab occupant. This stale data is then potentially dumped to userspace by ctnetlink_exp_dump_expect(), which checks these fields to decide whether to emit CTA_EXPECT_NAT [1].

Exploitation

An attacker with the ability to create netfilter expectations without specifying CTA_EXPECT_NAT can exploit this flaw. By first allocating NAT-bearing expectations to prime the slab, then freeing them and creating a new expectation without CTA_EXPECT_NAT, the attacker can cause the kernel to include a spurious CTA_EXPECT_NAT in the netlink dump, containing stale data from the prior allocation. No special privileges beyond the ability to interact with netfilter are required, but the attack is local to the kernel context.

Impact

Successful exploitation leads to an information disclosure, leaking kernel memory contents to userspace. The leaked data may contain sensitive information from previous use of the memory slab, potentially aiding further attacks. The CVSS v3 score is 5.5 (Medium), with the confidentiality impact rated as high, while integrity and availability are unaffected.

Mitigation

The issue is fixed by explicitly zeroing the saved_addr, saved_proto, and dir fields in the else branch when CTA_EXPECT_NAT is absent, guarded by IS_ENABLED(CONFIG_NF_NAT). Patches are available in the Linux kernel stable repositories [1][2][3][4]. Users should apply the latest kernel updates to remediate the vulnerability.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

7
  • Linux/Kernel7 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=3.4,<5.10.253
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.