CVE-2026-43042

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
01/05/2026
Last modified:
08/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mpls: add seqcount to protect the platform_label{,s} pair<br /> <br /> The RCU-protected codepaths (mpls_forward, mpls_dump_routes) can have<br /> an inconsistent view of platform_labels vs platform_label in case of a<br /> concurrent resize (resize_platform_label_table, under<br /> platform_mutex). This can lead to OOB accesses.<br /> <br /> This patch adds a seqcount, so that we get a consistent snapshot.<br /> <br /> Note that mpls_label_ok is also susceptible to this, so the check<br /> against RTA_DST in rtm_to_route_config, done outside platform_mutex,<br /> is not sufficient. This value gets passed to mpls_label_ok once more<br /> in both mpls_route_add and mpls_route_del, so there is no issue, but<br /> that additional check must not be removed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.1 (including) 6.19.12 (excluding)
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*