PatchSiren cyber security CVE debrief
CVE-2026-43454 Linux CVE debrief
CVE-2026-43454 is a high-severity Linux kernel issue in netfilter's nf_tables netdev hook handling. According to the published record, duplicate device registration must be avoided when processing NETDEV_REGISTER notifications because the device may already have been added during hook allocation. The CVE was published on 2026-05-08 and later modified on 2026-05-20. NVD rates it as local, low-privilege, no-user-interaction exposure with high confidentiality, integrity, and availability impact.
- Vendor
- Linux
- Product
- Unknown
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-08
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-05-08
- Advisory updated
- 2026-05-20
Who should care
Linux kernel maintainers, distro security teams, and administrators of systems running affected kernel versions should care most. Systems with local users, container workloads, or other paths that expose untrusted local code execution should prioritize review and patching.
Technical summary
NVD lists the vulnerability as affecting Linux kernel versions 6.16 through 6.18.19, 6.19 through 6.19.9, and early 7.0 release candidates (rc1, rc2, rc3). The source description says the fix is in netfilter nf_tables netdev hook handling: when a NETDEV_REGISTER notification arrives, the code must not register the same device twice because nft_netdev_hook_alloc() may already have added it while the hook was being created. The NVD CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.
Defensive priority
High. This is a kernel-level issue with local low-privilege exposure and high CIA impact, so affected systems should be patched as soon as vendor updates are available.
Recommended defensive actions
- Apply the vendor or stable-kernel patches referenced by Linux kernel stable commits.
- Verify whether your deployed kernels fall within the affected ranges: 6.16-6.18.19, 6.19-6.19.9, or early 7.0 release candidates.
- Prioritize patching hosts that allow untrusted local users, container tenants, or other local code execution paths.
- Track downstream distro advisories for backported fixes if you do not use upstream stable kernels.
- After patching, confirm the running kernel includes the fix before returning affected systems to normal service.
Evidence notes
All statements are based on the supplied CVE record and NVD metadata. The record identifies the Linux kernel as affected, describes the duplicate-device issue in nf_tables netdev hooks during NETDEV_REGISTER handling, provides affected version ranges, and links three official Linux kernel stable patch references. No exploit details or unsupported root-cause claims are included.
Official resources
-
CVE-2026-43454 CVE record
CVE.org
-
CVE-2026-43454 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
Publicly disclosed in the CVE/NVD record on 2026-05-08; NVD metadata was last modified on 2026-05-20.