Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent ctnetlink_alloc_expect() allocates expectations from a non-zeroing slab cache via nf_ct_expect_alloc(). When CTA_EXPECT_NAT is not present in the netlink message, saved_addr and saved_proto are never initialized. Stale data from a previous slab occupant can then be dumped to userspace by ctnetlink_exp_dump_expect(), which checks these fields to decide whether to emit CTA_EXPECT_NAT. The safe sibling nf_ct_expect_init(), used by the packet path, explicitly zeroes these fields. Zero saved_addr, saved_proto and dir in the else branch, guarded by IS_ENABLED(CONFIG_NF_NAT) since these fields only exist when NAT is enabled. Confirmed by priming the expect slab with NAT-bearing expectations, freeing them, creating a new expectation without CTA_EXPECT_NAT, and observing that the ctnetlink dump emits a spurious CTA_EXPECT_NAT containing stale data from the prior allocation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.4, < 5.10.253 |
References
- https://git.kernel.org/stable/c/1c2ebdeff8d088a2e47ae25d7b38447249adace2Patch
- https://git.kernel.org/stable/c/2898080c054ea4d6ddfaaf21bbedbc229a9a8376Patch
- https://git.kernel.org/stable/c/35177c6877134a21315f37d57a5577846225623ePatch
- https://git.kernel.org/stable/c/929f7a9a7aad9404a5867216c3f8738232355b38Patch
- https://git.kernel.org/stable/c/a5a89db6981a1ddf2314bf50cb49db5a3146185fPatch
- https://git.kernel.org/stable/c/a64b7bf84b4d5ea54218c5d374ec87fff9000f43Patch
- https://git.kernel.org/stable/c/bff0f4f06f12d6d9bc565a3e1378abd4f6f5ce36Patch
- https://git.kernel.org/stable/c/fd002ff2ea030cbfb0188a11b3c60ce7f84485f4Patch
FAQ
What is CVE-2026-43026?
CVE-2026-43026 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent ctnetlink_alloc_expect() allocates expectations from a non...
How severe is CVE-2026-43026?
CVE-2026-43026 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43026?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.