bpf: Fix regsafe() for pointers to packet
Summary
| CVE | CVE-2026-43030 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:47 UTC |
| Updated | 2026-05-01 15:24:14 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix regsafe() for pointers to packet
In case rold->reg->range == BEYOND_PKT_END && rcur->reg->range == N
regsafe() may return true which may lead to current state with
valid packet range not being explored. Fix the bug. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 95b6ec733752b31bfd166c4609d2c1b5cdde9b47 b52f6d0ef7b308f9d05bbddb78749852f28e8e40 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6d94e741a8ff818e5518da8257f5ca0aaed1f269 37db6b9726d0bcf91cbdf9d63b558c50da49f968 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6d94e741a8ff818e5518da8257f5ca0aaed1f269 015a74476dc1ab6923d89f1ee009aaf43faa7185 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6d94e741a8ff818e5518da8257f5ca0aaed1f269 b99d82706bd1511bb875e3de7154698fd9215c99 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6d94e741a8ff818e5518da8257f5ca0aaed1f269 7241da033fdc507b920e092dab1f97b945cb0370 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6d94e741a8ff818e5518da8257f5ca0aaed1f269 8aebe18069394f4a79d2d82080a0f806da449996 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6d94e741a8ff818e5518da8257f5ca0aaed1f269 ca995b1462ec6db1e869100ba1fb7356bd3f22f0 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6d94e741a8ff818e5518da8257f5ca0aaed1f269 a8502a79e832b861e99218cbd2d8f4312d62e225 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.11 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.11 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.134 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.81 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.22 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.12 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/37db6b9726d0bcf91cbdf9d63b558c50da49f968 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/b99d82706bd1511bb875e3de7154698fd9215c99 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/a8502a79e832b861e99218cbd2d8f4312d62e225 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/8aebe18069394f4a79d2d82080a0f806da449996 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/ca995b1462ec6db1e869100ba1fb7356bd3f22f0 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/7241da033fdc507b920e092dab1f97b945cb0370 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/b52f6d0ef7b308f9d05bbddb78749852f28e8e40 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/015a74476dc1ab6923d89f1ee009aaf43faa7185 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.