CVE-2026-23321
Use-After-Free in Linux Kernel MPTCP Endpoint Management
Publication date: 2026-03-25
Last updated on: 2026-04-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.10.5 (inc) to 6.11 (exc) |
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.17 (exc) |
| linux | linux_kernel | From 6.1.106 (inc) to 6.1.167 (exc) |
| linux | linux_kernel | From 6.11.1 (inc) to 6.12.78 (exc) |
| linux | linux_kernel | From 6.6.46 (inc) to 6.6.130 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's Multipath TCP (MPTCP) implementation, specifically in the path manager (pm) kernel code. It involves improper handling of MPTCP endpoints that have both 'signal' and 'subflow' flags set. Syzkaller, a kernel fuzzer, found a sequence of actions that triggered a warning due to the kernel not correctly marking these endpoints as used.
The problematic sequence includes setting the MPTCP subflows limit to zero, creating an MPTCP endpoint with both 'signal' and 'subflow' flags, initiating a new MPTCP connection from a different address (which sends an ADD_ADDR signal but does not start any subflows), and then removing the MPTCP endpoint. This leads to a warning in the kernel code indicating inconsistent state management.
How can this vulnerability impact me? :
The vulnerability can cause warnings and potentially unstable behavior in the Linux kernel's MPTCP path manager. While the exact impact is not detailed, such kernel warnings often indicate possible race conditions or state inconsistencies that could lead to kernel crashes, denial of service, or unexpected network behavior when using MPTCP.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as kernel warnings related to MPTCP (Multipath TCP) subflow and signal endpoint usage. Detection involves monitoring kernel logs for specific warning messages such as:
- WARNING: net/mptcp/pm_kernel.c:1071 at __mark_subflow_endp_available
- WARNING: net/mptcp/pm_kernel.c:1071 at mptcp_nl_remove_subflow_and_signal_addr
- WARNING: net/mptcp/pm_kernel.c:1071 at mptcp_pm_nl_del_addr_doit
To detect these warnings, you can use commands to check the kernel log, such as:
- dmesg | grep mptcp
- journalctl -k | grep mptcp
- tail -f /var/log/kern.log | grep mptcp
Additionally, monitoring for unusual MPTCP endpoint configurations or subflow limits set to zero may help identify attempts to trigger this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability has been resolved.
Since the issue is related to the MPTCP implementation in the kernel, ensure that your system is running a patched kernel version that includes the fix for marking signal+subflow endpoints as used.
As a temporary measure, avoid configurations that set the MPTCP subflows limit to zero or create MPTCP endpoints with both 'signal' and 'subflow' flags simultaneously, as these actions trigger the vulnerability.