CVE-2026-43339
Published: Fri, 08 May 2026 14:16
Summary
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible UaF in addrconf_permanent_addr() The mentioned helper try to warn the user about an exceptional condition,
Details
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible UaF in addrconf_permanent_addr() The mentioned helper try to warn the user about an exceptional condition, but the message is delivered too late, accessing the ipv6 after its possible deletion. Reorder the statement to avoid the possible UaF; while at it, place the warning outside the idev->lock as it needs no protection.
Are YOU affected by CVE-2026-43339?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-43339 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/25357b670afb5b517096da783abaa5cc4bf8359e
- https://git.kernel.org/stable/c/2d88ed7fa000e19c2dc0fa31b3a849e3f5bca5c1
- https://git.kernel.org/stable/c/3cd4efb5df72843dfac892d0b3c7a4a8bd926b65
- https://git.kernel.org/stable/c/7bfafa1b0cd582983ebec6bb20f0a435528fe567
- https://git.kernel.org/stable/c/7d9f2f4aabd116ca68fbdab5d8fb8dac74c2ea1e
- https://git.kernel.org/stable/c/bacc7f31085c9820922f00bc7d79756ffa13123a
- https://git.kernel.org/stable/c/eec49a33611f20336b357b3953df44f1a02049e8
- https://git.kernel.org/stable/c/fd63f185979b047fb22a0dfc6bd94d0cab6a6a70
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.