-

CVE-2026-43453

netfilter: nft_set_pipapo: fix stack out-of-bounds read in pipapo_drop()

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: fix stack out-of-bounds read in pipapo_drop()

pipapo_drop() passes rulemap[i + 1].n to pipapo_unmap() as the
to_offset argument on every iteration, including the last one where
i == m->field_count - 1. This reads one element past the end of the
stack-allocated rulemap array (declared as rulemap[NFT_PIPAPO_MAX_FIELDS]
with NFT_PIPAPO_MAX_FIELDS == 16).

Although pipapo_unmap() returns early when is_last is true without
using the to_offset value, the argument is evaluated at the call site
before the function body executes, making this a genuine out-of-bounds
stack read confirmed by KASAN:

  BUG: KASAN: stack-out-of-bounds in pipapo_drop+0x50c/0x57c [nf_tables]
  Read of size 4 at addr ffff8000810e71a4

  This frame has 1 object:
   [32, 160) 'rulemap'

  The buggy address is at offset 164 -- exactly 4 bytes past the end
  of the rulemap array.

Pass 0 instead of rulemap[i + 1].n on the last iteration to avoid
the out-of-bounds read.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < 1957e793196e7f8557374fd4eda53abcbb42e1c0
Status affected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < 57fb87ca095d5127cd7a27583b8ec43dcf7c9e9e
Status affected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < 60c1d18781e37bfb96290b86510eb01c5fa24d75
Status affected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < 0a55d62cdb628923d8a21724374a70c76ac7d19d
Status affected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < dfbdac719198778b581bc0dd055df2542edb8c62
Status affected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < e047f6fbb975f685d6c9fcef95b3b7787a79b46d
Status affected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < 324b749aa5b2d516ccfab933df9d3f56e7807f5f
Status affected
Version 3c4287f62044a90e73a561aa05fc46e62da173da
Version < d6d8cd2db236a9dd13dbc2d05843b3445cc964b5
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.6
Status affected
Version 0
Version < 5.6
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.094
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.