PT-2026-39035 · Linux · Linux Kernel

Published

2026-05-08

·

Updated

2026-05-08

·

CVE-2026-43374

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description A use-after-free issue exists in the Linux kernel within the remove nh grp entry() function. The system publishes a new group using rcu assign pointer() and immediately frees the removed entry's percpu stats via free percpu(). Because the synchronize net() grace period occurs after this free operation, RCU readers that entered before the publish can still access the old group and dereference the freed stats through nh grp entry stats inc() and get cpu ptr(nhge->stats), leading to a use-after-free on percpu memory.
Recommendations Defer the free percpu() operation until after the synchronize net() grace period in the caller function by chaining removed entries via nh list onto a local deferred free list.

Related Identifiers

CVE-2026-43374

Affected Products

Linux Kernel