Description
In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible UaF in addrconf_permanent_addr()

The mentioned helper try to warn the user about an exceptional
condition, but the message is delivered too late, accessing the ipv6
after its possible deletion.

Reorder the statement to avoid the possible UaF; while at it, place the
warning outside the idev->lock as it needs no protection.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel, the helper addrconf_permanent_addr contains logic that warns users of an exceptional condition after the IPv6 address structure may already have been freed. The message is delivered too late, so the code can access memory that has potentially been reclaimed, creating a classic use‑after‑free flaw.

Affected Systems

All Linux kernel implementations are affected; the vulnerability exists until the patch that reorders the warning and moves it outside the idev->lock guard is applied.

Risk and Exploitability

The use‑after‑free flaw allows kernel code to access memory that may have already been freed, potentially corrupting kernel state. The description does not detail the exact consequences an attacker could achieve, so we cannot assert whether denial of service or privilege escalation is possible. Potential system crashes or instability are inferred from the nature of use‑after‑free bugs, but such outcomes are not explicitly stated in the public data. The EPSS score is not included in the input, so we infer it is unavailable; likewise, no CVSS score is provided, and the vulnerability is not listed in CISA KEV. Because of these data gaps, the likelihood of exploitation cannot be determined from the available information.

Generated by OpenCVE AI on May 8, 2026 at 20:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest stable kernel update that includes the fix for the addrconf_permanent_addr use‑after‑free bug.
  • If an immediate kernel upgrade is not possible, disable IPv6 on the affected machines to eliminate the vulnerable code path until the patch is available.
  • Monitor system logs and kernel integrity for signs of abnormal behavior, and consider hardening measures such as SELinux enforcement or disabling loadable modules until the fix is deployed.

Generated by OpenCVE AI on May 8, 2026 at 20:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible UaF in addrconf_permanent_addr() The mentioned helper try to warn the user about an exceptional condition, but the message is delivered too late, accessing the ipv6 after its possible deletion. Reorder the statement to avoid the possible UaF; while at it, place the warning outside the idev->lock as it needs no protection.
Title ipv6: prevent possible UaF in addrconf_permanent_addr()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:31:24.315Z

Reserved: 2026-05-01T14:12:56.003Z

Link: CVE-2026-43339

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:43.777

Modified: 2026-05-08T14:16:43.777

Link: CVE-2026-43339

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T21:30:05Z

Weaknesses