CVE-2026-43383
Description
In the Linux kernel, the following vulnerability has been resolved:
net/tcp-md5: Fix MAC comparison to be constant-time
To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2026-43383: Linux kernel TCP MD5 MAC comparison not constant-time, enabling timing attacks.
This vulnerability in the Linux kernel's TCP MD5 signature handling involves a non-constant-time comparison of Message Authentication Codes (MACs). The kernel function responsible for validating the MAC used in TCP MD5 (unnecessary quote) did not use a constant-time comparison primitive, making it susceptible to timing side-channel attacks where an attacker can deduce the MAC value by observing timing variations.
The attack surface is exposed to any unauthenticated network-level adversary who can send crafted TCP segments to a host that uses TCP MD5 signatures (commonly deployed in BGP peering sessions). By measuring the time taken for the kernel to compare a supplied MAC against the expected value, the attacker can iteratively leak the correct MAC byte by byte, without needing to know the shared secret. No authentication is no authentication prerequisite beyond network connectivity; the attacker must be able to deliver packets to the target and observe response latencies.
A successful exploit allows an attacker to forge TCP segments with a valid MD5 signature, leading to impersonation of legitimate TCP peers. This can enable session hijacking, man-in-the-middle attacks, and disruption of BGP routing sessions, with potentially severe consequences for network infrastructure. Since the vulnerability is in the common Linux kernel networking stack, systems running affected kernels (before the fix) that use TCP MD5 are at risk.
The fix is already committed to the Linux kernel stable tree [1], and distribution vendors have backported the patch. Users are strongly encouraged to apply the latest kernel updates or set the TCP MD5 usage as soon as possible. The patch replaces the non-constant memory comparison with a constant-time helper, eliminating the timing side channel. No workaround exists other than disabling TCP MD5 or applying the fix.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/02669e2a4d207068edce7e8b5fafd85822018ce6nvd
- git.kernel.org/stable/c/345a9530756528d7ca407663d659c3c40e75c3ddnvd
- git.kernel.org/stable/c/46d0d6f50dab706637f4c18a470aac20a21900d3nvd
- git.kernel.org/stable/c/5d305a95130a8d08b9545e47f1e18d29d59866cbnvd
- git.kernel.org/stable/c/821c8751fdeecdeecabeb11704dd33439c9e4bbcnvd
- git.kernel.org/stable/c/ae3831b44f477de048287493e184fc3ff913b624nvd
- git.kernel.org/stable/c/b502e97e29d791ff7a8051f29a414535739be218nvd
News mentions
0No linked articles in our index yet.