Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43271
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:28
Updated At-07 May, 2026 | 17:15
Rejected At-
▼CVE Numbering Authority (CNA)
md-cluster: fix NULL pointer dereference in process_metadata_update

In the Linux kernel, the following vulnerability has been resolved: md-cluster: fix NULL pointer dereference in process_metadata_update The function process_metadata_update() blindly dereferences the 'thread' pointer (acquired via rcu_dereference_protected) within the wait_event() macro. While the code comment states "daemon thread must exist", there is a valid race condition window during the MD array startup sequence (md_run): 1. bitmap_load() is called, which invokes md_cluster_ops->join(). 2. join() starts the "cluster_recv" thread (recv_daemon). 3. At this point, recv_daemon is active and processing messages. 4. However, mddev->thread (the main MD thread) is not initialized until later in md_run(). If a METADATA_UPDATED message is received from a remote node during this specific window, process_metadata_update() will be called while mddev->thread is still NULL, leading to a kernel panic. To fix this, we must validate the 'thread' pointer. If it is NULL, we release the held lock (no_new_dev_lockres) and return early, safely ignoring the update request as the array is not yet fully ready to process it.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/md-cluster.c
Default Status
unaffected
Versions
Affected
  • From 0ba959774e93911caff596de6391f085fb640ac4 before a61c1bc84c4a0f1e7c2fe55b0f43d7d94af4adf1 (git)
  • From 0ba959774e93911caff596de6391f085fb640ac4 before dec123825c1ed74d98fd5fc7571a851dea4f46ff (git)
  • From 0ba959774e93911caff596de6391f085fb640ac4 before 721599e837d3f4c0e6cc14da059612c017b6d3ec (git)
  • From 0ba959774e93911caff596de6391f085fb640ac4 before dceb5a843910004cb118148e267036104fc3ee43 (git)
  • From 0ba959774e93911caff596de6391f085fb640ac4 before f150e753cb8dd756085f46e86f2c35ce472e0a3c (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/md-cluster.c
Default Status
affected
Versions
Affected
  • 4.12
Unaffected
  • From 0 before 4.12 (semver)
  • From 6.6.128 through 6.6.* (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a61c1bc84c4a0f1e7c2fe55b0f43d7d94af4adf1
N/A
https://git.kernel.org/stable/c/dec123825c1ed74d98fd5fc7571a851dea4f46ff
N/A
https://git.kernel.org/stable/c/721599e837d3f4c0e6cc14da059612c017b6d3ec
N/A
https://git.kernel.org/stable/c/dceb5a843910004cb118148e267036104fc3ee43
N/A
https://git.kernel.org/stable/c/f150e753cb8dd756085f46e86f2c35ce472e0a3c
N/A
Hyperlink: https://git.kernel.org/stable/c/a61c1bc84c4a0f1e7c2fe55b0f43d7d94af4adf1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dec123825c1ed74d98fd5fc7571a851dea4f46ff
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/721599e837d3f4c0e6cc14da059612c017b6d3ec
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dceb5a843910004cb118148e267036104fc3ee43
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f150e753cb8dd756085f46e86f2c35ce472e0a3c
Resource: N/A
Details not found