CVE-2026-43016

Google · Google Compute (Linux Kernel)

A use-after-free vulnerability exists in the Linux kernel's BPF sockmap implementation, specifically within the `sk_psock_verdict_data_ready` function.

Executive summary

A use-after-free vulnerability in the Linux kernel could allow a local attacker to cause system instability or gain elevated privileges.

Vulnerability

The flaw arises from improper handling of sk->sk_socket within the BPF sockmap code, leading to a use-after-free condition. This is a memory management issue that can be triggered by an attacker with sufficient local access.

Business impact

With a CVSS score of 7.8, this vulnerability represents a significant risk to cloud instances using affected Linux kernels. Successful exploitation could lead to arbitrary code execution, potentially allowing an attacker to escape container boundaries or gain root access, threatening the confidentiality and integrity of the entire compute instance.

Remediation

Immediate Action: Update the kernel on all Google Compute instances to the latest version provided by your distribution vendor that includes the fix for this BPF vulnerability.

Proactive Monitoring: Implement kernel-level monitoring and log analysis to detect unusual system behavior or crashes that may coincide with exploit attempts.

Compensating Controls: Use container security tools to limit the BPF capabilities of non-privileged users, thereby reducing the attack surface for this vulnerability.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The urgency of this update is high, particularly for multi-tenant or containerized environments. Administrators should test and deploy the kernel patches as part of their next maintenance window to prevent potential privilege escalation.