CVE-2026-43050
Use-After-Free in Linux Kernel ATM LEC Module
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's ATM LEC (Logical Link Control) code, specifically in the function sock_def_readable().
A race condition occurs because lec_atm_close() sets a pointer (priv->lecd) to NULL without synchronization, while other functions concurrently access this pointer. If the socket is freed while another thread is still using it, the code tries to access memory that has already been freed, causing a use-after-free.
The fix involves converting priv->lecd to an RCU-protected pointer and using appropriate RCU mechanisms (like rcu_assign_pointer, rcu_access_pointer, rcu_read_lock, etc.) to ensure safe concurrent access and prevent the race condition.
How can this vulnerability impact me? :
A use-after-free vulnerability can lead to undefined behavior such as system crashes, memory corruption, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited.
In this specific case, the race condition in the ATM LEC code could cause kernel instability or crashes, impacting system reliability and security.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by applying the patch that converts priv->lecd to an RCU-protected pointer in the Linux kernel's atm: lec module.
- Update your Linux kernel to a version that includes the fix for CVE-2026-43050.
- Ensure that the fix includes the use of rcu_assign_pointer(), rcu_access_pointer(), and proper RCU locking mechanisms as described.
- Avoid using any kernel versions that still use the vulnerable spinlock + sock_hold/put approach.