Linux kernel: XT option walkers allow 1byte tail read
CVE-2026-43452 Published on May 8, 2026
netfilter: x_tables: guard option walkers against 1-byte tail reads
In the Linux kernel, the following vulnerability has been resolved:
netfilter: x_tables: guard option walkers against 1-byte tail reads
When the last byte of options is a non-single-byte option kind, walkers
that advance with i += op[i + 1] ? : 1 can read op[i + 1] past the end
of the option area.
Add an explicit i == optlen - 1 check before dereferencing op[i + 1]
in xt_tcpudp and xt_dccp option walkers.
Products Associated with CVE-2026-43452
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below c2a445367a496a3c25dbc940c10c8bd1cfd4c14a is affected.
- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below ae1e1267650638136b84c23f2b31250f0ccb6823 is affected.
- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below c39f84e4be1be63fc60ca7141ea7b76edcea5907 is affected.
- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below 9b94f0e42ed248eb31929da84ed9f5310d7ff540 is affected.
- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below 5b18b8b35c7cded2d17b2b2604c9b0694ff48d1c is affected.
- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below bc18551c6169eac5ed813778d3e3e484002dbbe5 is affected.
- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below d04800323336eebf441d153f43234eac9b833d36 is affected.
- Version 2e4e6a17af35be359cc8f1c924f8f198fbd478cc and below cfe770220ac2dbd3e104c6b45094037455da81d4 is affected.
- Version 2.6.16 is affected.
- Before 2.6.16 is unaffected.
- Version 5.10.253, <= 5.10.* is unaffected.
- Version 5.15.203, <= 5.15.* is unaffected.
- Version 6.1.167, <= 6.1.* is unaffected.
- Version 6.6.130, <= 6.6.* is unaffected.
- Version 6.12.78, <= 6.12.* is unaffected.
- Version 6.18.19, <= 6.18.* is unaffected.
- Version 6.19.9, <= 6.19.* is unaffected.
- Version 7.0, <= * is unaffected.