CVE-2026-43232
Use-After-Free in FarSync T-Series Linux Kernel Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's FarSync T-series card driver. When the card is detached, the associated data structure (fst_card_info) is freed, but certain tasks (fst_tx_task or fst_int_task) may still be running or scheduled to run. These tasks can then access the already freed memory, leading to use-after-free errors.
The issue arises due to a race condition between the cleanup process that frees the card information and the tasklets that process transmit or interrupt work queues. This can cause the kernel to access invalid memory, potentially leading to crashes or undefined behavior.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to the kernel accessing freed memory. It may lead to kernel panics or other unpredictable behavior, which can disrupt normal system operations.
In environments using the affected FarSync T-series card, this bug could result in denial of service or potentially be exploited to execute arbitrary code within the kernel context, depending on the attacker's capabilities.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves use-after-free bugs in the Linux kernel related to the FarSync T-series card when it is detached. Detection can be done by monitoring kernel logs for KASAN (Kernel Address Sanitizer) reports indicating slab-use-after-free errors in functions like do_bottom_half_tx or fst_process_tx_work_q.
To detect this vulnerability on your system, you can check the kernel logs for KASAN error messages using commands such as:
- dmesg | grep -i kasan
- journalctl -k | grep -i kasan
- grep -r 'slab-use-after-free' /var/log/
These commands help identify if the kernel has logged any use-after-free bugs related to the FarSync driver. Additionally, monitoring for system crashes or instability when detaching the FarSync T-series card may also indicate the presence of this issue.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is caused by use-after-free bugs in the FarSync T-series card driver in the Linux kernel. Immediate mitigation steps include:
- Avoid detaching or removing the FarSync T-series card until a patched kernel version is applied.
- Update the Linux kernel to a version where this vulnerability has been fixed, as indicated by the patch to fix use-after-free bugs in fst_remove_one() and related functions.
- If updating the kernel is not immediately possible, consider disabling the FarSync T-series card or its driver to prevent triggering the bug.
Monitoring kernel logs for KASAN errors can also help identify if the vulnerability is being triggered, allowing for timely response.