Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43292
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 May, 2026 | 13:11
Updated At-11 May, 2026 | 22:21
Rejected At-
▼CVE Numbering Authority (CNA)
mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node

In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node When CONFIG_PAGE_OWNER is enabled, freeing KASAN shadow pages during vmalloc cleanup triggers expensive stack unwinding that acquires RCU read locks. Processing a large purge_list without rescheduling can cause the task to hold CPU for extended periods (10+ seconds), leading to RCU stalls and potential OOM conditions. The issue manifests in purge_vmap_node() -> kasan_release_vmalloc_node() where iterating through hundreds or thousands of vmap_area entries and freeing their associated shadow pages causes: rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P6229/1:b..l ... task:kworker/0:17 state:R running task stack:28840 pid:6229 ... kasan_release_vmalloc_node+0x1ba/0xad0 mm/vmalloc.c:2299 purge_vmap_node+0x1ba/0xad0 mm/vmalloc.c:2299 Each call to kasan_release_vmalloc() can free many pages, and with page_owner tracking, each free triggers save_stack() which performs stack unwinding under RCU read lock. Without yielding, this creates an unbounded RCU critical section. Add periodic cond_resched() calls within the loop to allow: - RCU grace periods to complete - Other tasks to run - Scheduler to preempt when needed The fix uses need_resched() for immediate response under load, with a batch count of 32 as a guaranteed upper bound to prevent worst-case stalls even under light load.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • mm/vmalloc.c
Default Status
unaffected
Versions
Affected
  • From 282631cb2447318e2a55b41a665dbe8571c46d70 before 2efa9c02c9b4c0d6866aa445f11056809b25ca28 (git)
  • From 282631cb2447318e2a55b41a665dbe8571c46d70 before 1afe45f89d54b7183768ebbbbf14238ec187ab5c (git)
  • From 282631cb2447318e2a55b41a665dbe8571c46d70 before b351fbe71091f7c8676c8ba597653d08b6719447 (git)
  • From 282631cb2447318e2a55b41a665dbe8571c46d70 before 5747435e0fd474c24530ef1a6822f47e7d264b27 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • mm/vmalloc.c
Default Status
affected
Versions
Affected
  • 6.9
Unaffected
  • From 0 before 6.9 (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2efa9c02c9b4c0d6866aa445f11056809b25ca28
N/A
https://git.kernel.org/stable/c/1afe45f89d54b7183768ebbbbf14238ec187ab5c
N/A
https://git.kernel.org/stable/c/b351fbe71091f7c8676c8ba597653d08b6719447
N/A
https://git.kernel.org/stable/c/5747435e0fd474c24530ef1a6822f47e7d264b27
N/A
Hyperlink: https://git.kernel.org/stable/c/2efa9c02c9b4c0d6866aa445f11056809b25ca28
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1afe45f89d54b7183768ebbbbf14238ec187ab5c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b351fbe71091f7c8676c8ba597653d08b6719447
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5747435e0fd474c24530ef1a6822f47e7d264b27
Resource: N/A
Details not found