In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix regsafe() for pointers to packet
In case rold->reg->range == BEYOND_PKT_END && rcur->reg->range == N
regsafe() may return true which may lead to current state with
valid packet range not being explored. Fix the bug.
bpf: Fix regsafe() for pointers to packet
In case rold->reg->range == BEYOND_PKT_END && rcur->reg->range == N
regsafe() may return true which may lead to current state with
valid packet range not being explored. Fix the bug.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6243-1 | linux security update |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 02 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-372 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 01 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Fri, 01 May 2026 14:45:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-01T14:15:30.564Z
Reserved: 2026-05-01T14:12:55.977Z
Link: CVE-2026-43030
No data.
Status : Awaiting Analysis
Published: 2026-05-01T15:16:47.557
Modified: 2026-05-01T15:24:14.893
Link: CVE-2026-43030
OpenCVE Enrichment
Updated: 2026-05-01T23:15:29Z
Debian DSA