bpf: crypto: Use the correct destructor kfunc type
Summary
| CVE | CVE-2026-43306 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-08 14:16:37 UTC |
| Updated | 2026-05-12 14:10:27 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: bpf: crypto: Use the correct destructor kfunc type With CONFIG_CFI enabled, the kernel strictly enforces that indirect function calls use a function pointer type that matches the target function. I ran into the following type mismatch when running BPF self-tests: CFI failure at bpf_obj_free_fields+0x190/0x238 (target: bpf_crypto_ctx_release+0x0/0x94; expected type: 0xa488ebfc) Internal error: Oops - CFI: 00000000f2008228 [#1] SMP ... As bpf_crypto_ctx_release() is also used in BPF programs and using a void pointer as the argument would make the verifier unhappy, add a simple stub function with the correct type and register it as the destructor kfunc instead. |
Risk And Classification
EPSS: 0.000180000 probability, percentile 0.047270000 (date 2026-05-12)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 3e1c6f35409f9e447bf37f64840f5b65576bfb78 4e3e57dbf46dad3498f8c4219ce2dba756875962 git | Not specified |
| CNA | Linux | Linux | affected 3e1c6f35409f9e447bf37f64840f5b65576bfb78 50d6fd69388cc7b05dce72f09080674dcede4ac9 git | Not specified |
| CNA | Linux | Linux | affected 3e1c6f35409f9e447bf37f64840f5b65576bfb78 3979a550fe06b370d73647f59cf462fa525c9ec4 git | Not specified |
| CNA | Linux | Linux | affected 3e1c6f35409f9e447bf37f64840f5b65576bfb78 b40a5d724f29fc2eed23ff353808a9aae616b48a git | Not specified |
| CNA | Linux | Linux | affected 6.10 | Not specified |
| CNA | Linux | Linux | unaffected 6.10 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.75 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.16 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.6 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/3979a550fe06b370d73647f59cf462fa525c9ec4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/4e3e57dbf46dad3498f8c4219ce2dba756875962 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/b40a5d724f29fc2eed23ff353808a9aae616b48a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/50d6fd69388cc7b05dce72f09080674dcede4ac9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.