LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31669

CVE-2026-31669 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: April 27, 2026

Linux Kernel - Use After Free

Published: April 24, 2026Updated: April 27, 2026Remote Exploitable

Overview

Linux kernel contains a use-after-free vulnerability in MPTCP caused by improper slab cache initialization in mptcp_subflow_init, letting attackers trigger slab-use-after-free in __inet_lookup_established, exploit requires concurrent ehash lookups under RCU read lock.

Severity & Score

Severity: Critical
CVSS Score: 9.8

Impact

Attackers can cause use-after-free memory access, potentially leading to system crashes or arbitrary code execution.

Mitigation

Update to the latest Linux kernel version containing the fix for mptcp_subflow_v6_init initialization.

Details

CVE ID
CVE-2026-31669
Severity
Critical
CVSS Score
9.8
Type
use_after_free
Status
unconfirmed

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H