Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

DEBIAN-CVE-2026-43038

In the Linux kernel, the following vulnerability has been resolved: ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() Sashiko AI-review observed: In ip6_err_gen_icmpv6_unreach(), the s...
Back to all
CVE

DEBIAN-CVE-2026-43038

In the Linux kernel, the following vulnerability has been resolved: ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() Sashiko AI-review observed: In ip6_err_gen_icmpv6_unreach(), the s...

In the Linux kernel, the following vulnerability has been resolved:  ipv6: icmp: clear skb2->cb[] in ip6errgenicmpv6unreach()  Sashiko AI-review observed:    In ip6errgenicmpv6unreach(), the skb is an outer IPv4 ICMP error packet   where its cb contains an IPv4 inetskbparm. When skb is cloned into skb2   and passed to icmp6send(), it uses IP6CB(skb2).    IP6CB interprets the IPv4 inetskbparm as an inet6skbparm. The cipso   offset in inetskbparm.opt directly overlaps with dsthao in inet6skbparm   at offset 18.    If an attacker sends a forged ICMPv4 error with a CIPSO IP option, dsthao   would be a non-zero offset. Inside icmp6send(), mip6addrswap() is called   and uses ipv6findtlv(skb, opt->dsthao, IPV6TLVHAO).    This would scan the inner, attacker-controlled IPv6 packet starting at that   offset, potentially returning a fake TLV without checking if the remaining   packet length can hold the full 18-byte struct ipv6destopthao.    Could mip6addrswap() then perform a 16-byte swap that extends past the end   of the packet data into skbsharedinfo?    Should the cb array also be cleared in ip6errgenicmpv6unreach() and   ip6ip6err() to prevent this?  This patch implements the first suggestion.  I am not sure if ip6ip6err() needs to be changed. A separate patch would be better anyway.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
-
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://security-tracker.debian.org/tracker/CVE-2026-43038

Severity

9.8

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.8
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
0
Fix Available
6.1.170-1,6.12.85-1,6.19.12-1,6.1.170-1~deb11u1

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading