CVE-2026-43252
Use-After-Free in Linux Kernel MPTCP PM
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.18.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's Multipath TCP (MPTCP) path manager (pm) in the in-kernel implementation. It involves the improper handling of endpoint IDs, where the ID is always set as available when removing an endpoint. This issue was discovered through Syzkaller, a kernel fuzzing tool, which triggered warnings related to the function __mark_subflow_endp_available in the MPTCP path manager code.
The vulnerability manifests as a warning in the kernel logs indicating potential mishandling of subflow endpoints in MPTCP, which could lead to unexpected behavior in the network stack.
How can this vulnerability impact me? :
The vulnerability could cause instability or unexpected behavior in the Linux kernel's network stack, specifically in the Multipath TCP implementation. This might lead to warnings or errors during network operations involving MPTCP, potentially affecting network reliability or performance.
However, there is no explicit information provided about exploitation, privilege escalation, data leakage, or denial of service impacts.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the Linux kernel logs for specific warning messages related to the mptcp subsystem. The key indicator is the warning message originating from net/mptcp/pm_kernel.c at line 1074, such as:
- WARNING: net/mptcp/pm_kernel.c:1074 at __mark_subflow_endp_available net/mptcp/pm_kernel.c:1074
To detect this on your system, you can use the following command to search kernel logs for these warnings:
- sudo dmesg | grep 'net/mptcp/pm_kernel.c:1074'
Alternatively, you can monitor the system journal if using systemd:
- sudo journalctl -k | grep 'net/mptcp/pm_kernel.c:1074'
These commands help identify if the kernel is generating the specific warning messages that indicate the presence of this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Linux kernel to a version where this vulnerability has been resolved. The issue was fixed in the kernel source code related to the mptcp subsystem, so applying the latest kernel patches or upgrading to a fixed kernel version will address the problem.
Until the kernel is updated, monitoring kernel logs for the warning messages can help detect exploitation attempts, but no other specific mitigation steps are provided.