Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: ensure names are nul-terminated

Reject names that lack a \0 character before feeding them
to functions that expect c-strings.

Fixes tag is the most recent commit that needs this change.
Published: 2026-05-01
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability occurs in the Linux kernel’s netfilter x_tables subsystem when rule names are not guaranteed to be null‑terminated before being passed to functions that expect proper C strings. The missing null byte allows a name to extend beyond its intended buffer, causing kernel string handling functions to read or write past the buffer boundary. Such a memory corruption can overwrite critical kernel data structures, potentially enabling an attacker to gain elevated privileges or crash the system.

Affected Systems

All kernel releases that contain the unpatched netfilter x_tables code are affected. The change was applied in the latest kernel commit identified by the fix tag, but specific upstream versions are not enumerated in the advisory. Therefore any Linux kernel version prior to the most recent official kernel release that includes the null‑termination check is vulnerable.

Risk and Exploitability

Because the CVSS score of 5.5 and the EPSS score is unavailable, the likelihood of exploitation is uncertain. The likely attack vector is through a crafted netfilter rule name supplied by a local user or via an exposed interface that allows arbitrary rule names. The nature of the flaw – kernel memory corruption through improperly terminated strings – could enable privilege escalation or a crash if such a rule name overflows into critical kernel data structures. The risk profile is medium to high for systems where untrusted users can create netfilter rules or where network interfaces are exposed to untrusted traffic that can influence rule names.

Generated by OpenCVE AI on May 2, 2026 at 10:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a kernel version that includes the fix for null‑termination checks in netfilter x_tables rule names, such as the latest stable release or the commit identified in the advisory.
  • If a kernel upgrade cannot be performed immediately, restrict the creation and modification of netfilter rules to privileged users and disable or sandbox interfaces that accept arbitrary rule names from untrusted sources.
  • After applying the patch or tightening rule‑creation controls, reboot the system to ensure the updated kernel is active.

Generated by OpenCVE AI on May 2, 2026 at 10:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-170
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: ensure names are nul-terminated Reject names that lack a \0 character before feeding them to functions that expect c-strings. Fixes tag is the most recent commit that needs this change.
Title netfilter: x_tables: ensure names are nul-terminated
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:29.192Z

Reserved: 2026-05-01T14:12:55.976Z

Link: CVE-2026-43028

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:47.297

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-43028

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-43028 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:15:16Z

Weaknesses