The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43306

CVE-2026-43306: Linux Kernel Privilege Escalation Flaw

CVE-2026-43306 is a privilege escalation vulnerability in the Linux Kernel affecting BPF crypto destructor function handling. This security flaw involves CFI type mismatches. Learn about technical details, impact, and fixes.

Published: May 18, 2026

CVE-2026-43306 Overview

CVE-2026-43306 is a Linux kernel vulnerability in the Berkeley Packet Filter (BPF) crypto subsystem. The flaw stems from an incorrect destructor kfunc type registration for bpf_crypto_ctx_release(). On kernels built with Control Flow Integrity (CONFIG_CFI) enabled, the type mismatch triggers a CFI failure when bpf_obj_free_fields() performs an indirect call to the destructor. This results in a kernel oops and denial of service on affected systems.

Critical Impact

A local, low-privileged user able to load BPF programs that reference crypto context objects can trigger a CFI violation, causing kernel panic and host-wide denial of service on CFI-enabled Linux builds.

Affected Products

  • Linux Kernel (mainline branches containing the BPF crypto kfunc registration)
  • Linux distributions shipping kernels built with CONFIG_CFI_CLANG
  • Stable kernel trees prior to the commits listed in the kernel.org advisories

Discovery Timeline

  • 2026-05-08 - CVE-2026-43306 published to the National Vulnerability Database
  • 2026-05-15 - Last updated in NVD database

Technical Details for CVE-2026-43306

Vulnerability Analysis

The vulnerability resides in the BPF crypto subsystem of the Linux kernel. The kernel registers bpf_crypto_ctx_release() as the destructor kfunc for BPF crypto context objects. The function signature does not match the type expected by the indirect call site inside bpf_obj_free_fields().

When CONFIG_CFI is active, the kernel validates that the function pointer type at every indirect call matches the target function's declared type. The mismatch produces a CFI failure of the form CFI failure at bpf_obj_free_fields+0x190/0x238 (target: bpf_crypto_ctx_release+0x0/0x94; expected type: 0xa488ebfc), followed by an Internal error: Oops - CFI and kernel panic.

The fix introduces a thin stub function with the correct destructor signature and registers it as the kfunc instead. The original bpf_crypto_ctx_release() retains its void * parameter so BPF program verification still succeeds [CWE-NVD-CWE-noinfo].

Root Cause

The destructor kfunc registration used a function whose type signature accepted a typed pointer argument, while the BPF runtime invokes destructors through a pointer expecting a generic object argument. The CFI hash for the call site (0xa488ebfc) did not match the hash computed for bpf_crypto_ctx_release, so the integrity check aborted execution.

Attack Vector

Exploitation requires local access and the ability to load or attach BPF programs that allocate and release crypto context objects. This typically requires CAP_BPF or CAP_SYS_ADMIN, though unprivileged BPF may be available on some configurations. The triggered oops halts kernel execution paths and can crash the host, producing a denial-of-service condition.

No public proof-of-concept exploit is listed in the advisory, and the issue is not present on the CISA Known Exploited Vulnerabilities list. The EPSS data records an exploitation probability of 0.013%.

Detection Methods for CVE-2026-43306

Indicators of Compromise

  • Kernel log entries containing CFI failure at bpf_obj_free_fields referencing bpf_crypto_ctx_release as the call target.
  • Internal error: Oops - CFI panic messages followed by BPF-related stack frames in dmesg or journalctl -k.
  • Unexpected host reboots or kernel panics correlated with workloads loading BPF crypto programs.

Detection Strategies

  • Inspect kernel ring buffers for CFI violation signatures using dmesg | grep -i "CFI failure" across the fleet.
  • Audit BPF program loads with bpftool prog show and correlate against unprivileged users or unexpected workloads.
  • Compare running kernel versions (uname -r) against the patched commit hashes published on kernel.org.

Monitoring Recommendations

  • Forward kernel logs to a centralized logging or SIEM platform and alert on CFI failure strings.
  • Enable BPF audit logging where supported to record program load events and the loading UID.
  • Track host reboot frequency and kernel oops counters as health signals for fleet-wide regressions.

How to Mitigate CVE-2026-43306

Immediate Actions Required

  • Apply the upstream stable kernel updates that register the corrected destructor stub for the BPF crypto kfunc.
  • Inventory hosts running CFI-enabled kernels and prioritize patching on systems exposing BPF to non-root users.
  • Restrict BPF program loading to trusted administrators by setting kernel.unprivileged_bpf_disabled=1.

Patch Information

The issue is resolved by the following upstream commits on kernel.org: Linux Kernel Commit 3979a550, Linux Kernel Commit 4e3e57db, Linux Kernel Commit 50d6fd69, and Linux Kernel Commit b40a5d72. Rebuild and redeploy kernels from the corresponding stable branches.

Workarounds

  • Disable unprivileged BPF program loading by setting sysctl kernel.unprivileged_bpf_disabled=1 until patches are deployed.
  • Build kernels without CONFIG_CFI_CLANG to avoid the panic path, accepting the loss of CFI protection as a tradeoff.
  • Remove or restrict use of the BPF crypto kfunc set in workloads that do not require it.
bash
# Configuration example
# Disable unprivileged BPF program loading until patched kernels are deployed
sudo sysctl -w kernel.unprivileged_bpf_disabled=1
echo 'kernel.unprivileged_bpf_disabled=1' | sudo tee /etc/sysctl.d/90-bpf-hardening.conf

# Verify the running kernel version against patched stable releases
uname -r

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Linux Kernel Commit Fix

  • Linux Kernel Commit Fix

  • Linux Kernel Commit Fix

  • Linux Kernel Commit Fix
  • Related CVEs
  • CVE-2026-43332: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43344: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43351: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43321: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English