Description
In the Linux kernel, the following vulnerability has been resolved:

bpf: crypto: Use the correct destructor kfunc type

With CONFIG_CFI enabled, the kernel strictly enforces that indirect
function calls use a function pointer type that matches the target
function. I ran into the following type mismatch when running BPF
self-tests:

CFI failure at bpf_obj_free_fields+0x190/0x238 (target:
bpf_crypto_ctx_release+0x0/0x94; expected type: 0xa488ebfc)
Internal error: Oops - CFI: 00000000f2008228 [#1] SMP
...

As bpf_crypto_ctx_release() is also used in BPF programs and using
a void pointer as the argument would make the verifier unhappy, add
a simple stub function with the correct type and register it as the
destructor kfunc instead.
Published: 2026-05-08
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This bug occurs in the Linux kernel’s BPF crypto subsystem when the destructor function pointer type does not match the expected signature enforced by CONFIG_CFI. The mismatch triggers a Control‑Flow Integrity violation, causing the kernel to issue an Oops and crash. The primary impact is that any BPF program using the crypto context could abruptly terminate the system, effectively denying service to users or processes that rely on that kernel module.

Affected Systems

The flaw is present in the core Linux kernel, affecting all distributions that ship a kernel compiled with CONFIG_CFI and that make use of the BPF crypto context destructor. Specific kernel versions are not listed in the data, so any unpatched kernel with this configuration is at risk.

Risk and Exploitability

There is no EPSS score available and the vulnerability is not listed in the CISA KEV catalog, indicating limited public exploitation data. The CVSS score is also missing from the provided information, but the kernel crash suggests a high potential impact if an attacker can trigger the faulty destructor. Successful exploitation would likely require the attacker to execute a BPF program that exercises the crypto context or similar code paths, which could be achieved with local code execution or by manipulating system services that compile BPF programs. Given the absence of publicly known exploit samples, the immediate risk is largely from accidental or unintended crashes rather than targeted attacks, but the denial‑of‑service nature warrants prompt remediation.

Generated by OpenCVE AI on May 8, 2026 at 15:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the corrected destructor kfunc implementation.
  • Verify that the kernel is compiled with CONFIG_CFI enabled to enforce function pointer type checks.
  • Test BPF applications for abnormal crashes or Oops events, especially those that use crypto contexts, to ensure the patch has been effective.

Generated by OpenCVE AI on May 8, 2026 at 15:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-704

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: bpf: crypto: Use the correct destructor kfunc type With CONFIG_CFI enabled, the kernel strictly enforces that indirect function calls use a function pointer type that matches the target function. I ran into the following type mismatch when running BPF self-tests: CFI failure at bpf_obj_free_fields+0x190/0x238 (target: bpf_crypto_ctx_release+0x0/0x94; expected type: 0xa488ebfc) Internal error: Oops - CFI: 00000000f2008228 [#1] SMP ... As bpf_crypto_ctx_release() is also used in BPF programs and using a void pointer as the argument would make the verifier unhappy, add a simple stub function with the correct type and register it as the destructor kfunc instead.
Title bpf: crypto: Use the correct destructor kfunc type
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:11:25.624Z

Reserved: 2026-05-01T14:12:56.000Z

Link: CVE-2026-43306

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:37.913

Modified: 2026-05-08T14:16:37.913

Link: CVE-2026-43306

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T16:00:12Z

Weaknesses