PT-2026-36459 · Linux · Linux
Published
2026-05-01
·
Updated
2026-05-01
·
CVE-2026-43042
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
mpls: add seqcount to protect the platform label{,s} pair
The RCU-protected codepaths (mpls forward, mpls dump routes) can have
an inconsistent view of platform labels vs platform label in case of a
concurrent resize (resize platform label table, under
platform mutex). This can lead to OOB accesses.
This patch adds a seqcount, so that we get a consistent snapshot.
Note that mpls label ok is also susceptible to this, so the check
against RTA DST in rtm to route config, done outside platform mutex,
is not sufficient. This value gets passed to mpls label ok once more
in both mpls route add and mpls route del, so there is no issue, but
that additional check must not be removed.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux