PatchSiren cyber security CVE debrief
CVE-2026-43455 Linux CVE debrief
CVE-2026-43455 is a Linux kernel MCTP routing bug where a missing lock around a check-and-set sequence can race and leak a device reference. The issue is published in NVD with CVSS 5.5 (MEDIUM) and affects multiple kernel release lines until the fixed stable versions. NVD published the record on 2026-05-08 and last modified it on 2026-05-20.
- Vendor
- Linux
- Product
- Unknown
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-08
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-05-08
- Advisory updated
- 2026-05-20
Who should care
Linux kernel maintainers, distro security teams, and operators running kernels that include MCTP support, especially on systems where local users can reach the affected transmit path.
Technical summary
mctp_flow_prepare_output() checks key->dev and may call mctp_dev_set_key() without holding key->lock, even though the related key management functions are annotated as requiring that lock. In the mctp_sendmsg() transmit path, two concurrent callers can both observe key->dev as NULL and each acquire a device reference, but only the final assignment is tracked for release. The result is a lost reference on one device and a resource leak, which primarily impacts availability.
Defensive priority
Medium priority. The flaw requires local access and low privileges, but it can cause a kernel resource leak and availability degradation in affected systems.
Recommended defensive actions
- Apply the Linux stable fixes referenced in the official kernel patch links.
- Verify whether your deployed kernel falls within the affected ranges listed by NVD and plan updates accordingly.
- Prioritize patching systems that use MCTP functionality or expose it to untrusted local users.
- Monitor for kernel resource exhaustion or unusual device reference growth while remediation is in progress.
Evidence notes
This debrief is based on the supplied NVD CVE record, the CVE timing fields, and the official Linux kernel patch references. The vulnerability description states the race occurs in mctp_flow_prepare_output() when key->dev is checked and set without holding key->lock, and that the consequence is a leaked device reference leading to a resource leak. NVD classifies the issue as CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and marks affected Linux kernel ranges across multiple stable branches. The record was published on 2026-05-08 and modified on 2026-05-20.
Official resources
-
CVE-2026-43455 CVE record
CVE.org
-
CVE-2026-43455 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
Publicly disclosed via the CVE and NVD records on 2026-05-08, with NVD metadata last updated on 2026-05-20. Official Linux kernel patch references are listed in the NVD record.