CVE-2026-43374
Use-After-Free in Linux Kernel Nexthop Group Management
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's networking code related to nexthop groups. When a nexthop is removed from a group, the function remove_nh_grp_entry() updates the group pointer and immediately frees the removed entry's per-CPU statistics memory. However, the synchronization that ensures all readers have finished accessing the old data happens after this free operation. As a result, readers that started before the update may still access the freed memory, causing a use-after-free condition on per-CPU memory.
The fix involves deferring the freeing of the per-CPU statistics until after the synchronization grace period completes, ensuring no readers are accessing the freed memory.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to undefined behavior in the Linux kernel, including potential system crashes, data corruption, or security issues such as privilege escalation or denial of service. Since it involves kernel memory management, exploitation could compromise system stability or security.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by fixing the use-after-free issue in the nexthop group removal code. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.
- Identify the current kernel version running on your system.
- Check for available kernel updates from your Linux distribution that address this issue.
- Apply the kernel update and reboot the system to load the patched kernel.