netfilter: nf_conntrack_helper: pass helper to expect cleanup
Summary
| CVE | CVE-2026-43027 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:47 UTC |
| Updated | 2026-05-01 15:24:14 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_helper: pass helper to expect cleanup
nf_conntrack_helper_unregister() calls nf_ct_expect_iterate_destroy()
to remove expectations belonging to the helper being unregistered.
However, it passes NULL instead of the helper pointer as the data
argument, so expect_iter_me() never matches any expectation and all
of them survive the cleanup.
After unregister returns, nfnl_cthelper_del() frees the helper
object immediately. Subsequent expectation dumps or packet-driven
init_conntrack() calls then dereference the freed exp->helper,
causing a use-after-free.
Pass the actual helper pointer so expectations referencing it are
properly destroyed before the helper object is freed.
BUG: KASAN: slab-use-after-free in string+0x38f/0x430
Read of size 1 at addr ffff888003b14d20 by task poc/103
Call Trace:
string+0x38f/0x430
vsnprintf+0x3cc/0x1170
seq_printf+0x17a/0x240
exp_seq_show+0x2e5/0x560
seq_read_iter+0x419/0x1280
proc_reg_read+0x1ac/0x270
vfs_read+0x179/0x930
ksys_read+0xef/0x1c0
Freed by task 103:
The buggy address is located 32 bytes inside of
freed 192-byte region [ffff888003b14d00, ffff888003b14dc0) |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd 5cf28d5c8dcbbe8af6d3b145babe491906d7bad1 git |
Not specified |
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd 504ba4168466c91210c45acdc332479cfd5f2da6 git |
Not specified |
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd dc1739eff48e34cc71d4e2f03715493fbcebd8af git |
Not specified |
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd 2cf2737c85a2ba2b52024dafe68ffad2676f97be git |
Not specified |
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd 2c16e4d64dd91227742dfe196a3e7b0568bef65a git |
Not specified |
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd 620f3d14c1ef51d425060a3056ad8dbae8f998a3 git |
Not specified |
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd 90bd7e8501349db3006d21fbc09df9ffcb172965 git |
Not specified |
| CNA |
Linux |
Linux |
affected ac7b848390036dadd4351899d2a23748075916bd a242a9ae58aa46ff7dae51ce64150a93957abe65 git |
Not specified |
| CNA |
Linux |
Linux |
affected 4.14 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 4.14 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.134 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.81 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.22 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.12 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/a242a9ae58aa46ff7dae51ce64150a93957abe65 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/620f3d14c1ef51d425060a3056ad8dbae8f998a3 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/dc1739eff48e34cc71d4e2f03715493fbcebd8af |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/2c16e4d64dd91227742dfe196a3e7b0568bef65a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/504ba4168466c91210c45acdc332479cfd5f2da6 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/2cf2737c85a2ba2b52024dafe68ffad2676f97be |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/90bd7e8501349db3006d21fbc09df9ffcb172965 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/5cf28d5c8dcbbe8af6d3b145babe491906d7bad1 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.