Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43074
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 07:21
Updated At-08 May, 2026 | 12:40
Rejected At-
▼CVE Numbering Authority (CNA)
eventpoll: defer struct eventpoll free to RCU grace period

In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventpoll free to RCU grace period In certain situations, ep_free() in eventpoll.c will kfree the epi->ep eventpoll struct while it still being used by another concurrent thread. Defer the kfree() to an RCU callback to prevent UAF.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/eventpoll.c
Default Status
unaffected
Versions
Affected
  • From 58c9b016e12855286370dfb704c08498edbc857a before a6566cd33f6f967a7651ebf2ce0dd31572e319cf (git)
  • From 58c9b016e12855286370dfb704c08498edbc857a before 5b1173b165421561db29f30afc7e97d940a398a9 (git)
  • From 58c9b016e12855286370dfb704c08498edbc857a before 7e8083f5eeedab0f460063b9c2c14c9a4e71a427 (git)
  • From 58c9b016e12855286370dfb704c08498edbc857a before ae0bb9c1fb7c2594519aeeb096cf2c3b7837b322 (git)
  • From 58c9b016e12855286370dfb704c08498edbc857a before 07712db80857d5d09ae08f3df85a708ecfc3b61f (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/eventpoll.c
Default Status
affected
Versions
Affected
  • 6.4
Unaffected
  • From 0 before 6.4 (semver)
  • From 6.6.136 through 6.6.* (semver)
  • From 6.12.83 through 6.12.* (semver)
  • From 6.18.24 through 6.18.* (semver)
  • From 6.19.14 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a6566cd33f6f967a7651ebf2ce0dd31572e319cf
N/A
https://git.kernel.org/stable/c/5b1173b165421561db29f30afc7e97d940a398a9
N/A
https://git.kernel.org/stable/c/7e8083f5eeedab0f460063b9c2c14c9a4e71a427
N/A
https://git.kernel.org/stable/c/ae0bb9c1fb7c2594519aeeb096cf2c3b7837b322
N/A
https://git.kernel.org/stable/c/07712db80857d5d09ae08f3df85a708ecfc3b61f
N/A
Hyperlink: https://git.kernel.org/stable/c/a6566cd33f6f967a7651ebf2ce0dd31572e319cf
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5b1173b165421561db29f30afc7e97d940a398a9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7e8083f5eeedab0f460063b9c2c14c9a4e71a427
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ae0bb9c1fb7c2594519aeeb096cf2c3b7837b322
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/07712db80857d5d09ae08f3df85a708ecfc3b61f
Resource: N/A
Details not found