Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43309
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 May, 2026 | 13:11
Updated At-11 May, 2026 | 22:22
Rejected At-
▼CVE Numbering Authority (CNA)
md raid: fix hang when stopping arrays with metadata through dm-raid

In the Linux kernel, the following vulnerability has been resolved: md raid: fix hang when stopping arrays with metadata through dm-raid When using device-mapper's dm-raid target, stopping a RAID array can cause the system to hang under specific conditions. This occurs when: - A dm-raid managed device tree is suspended from top to bottom (the top-level RAID device is suspended first, followed by its underlying metadata and data devices) - The top-level RAID device is then removed Removing the top-level device triggers a hang in the following sequence: the dm-raid destructor calls md_stop(), which tries to flush the write-intent bitmap by writing to the metadata sub-devices. However, these devices are already suspended, making them unable to complete the write-intent operations and causing an indefinite block. Fix: - Prevent bitmap flushing when md_stop() is called from dm-raid destructor context and avoid a quiescing/unquescing cycle which could also cause I/O - Still allow write-intent bitmap flushing when called from dm-raid suspend context This ensures that RAID array teardown can complete successfully even when the underlying devices are in a suspended state. This second patch uses md_is_rdwr() to distinguish between suspend and destructor paths as elaborated on above.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/md.c
Default Status
unaffected
Versions
Affected
  • From 0dd84b319352bb8ba64752d4e45396d8b13e6018 before 24783dd06de870d646c25207bae186f78195f912 (git)
  • From 0dd84b319352bb8ba64752d4e45396d8b13e6018 before 338378dfffbdbb8d37a18f0a0c0358812671f91e (git)
  • From 0dd84b319352bb8ba64752d4e45396d8b13e6018 before cefcb9297fbdb6d94b61787b4f8d84f55b741470 (git)
  • 1678ca35b80a94d474fdc31e2497ce5d7ed52512 (git)
  • 690b5c90fd2d81fd1d2b6110fa36783232f6dce2 (git)
  • 8e7fb19f1a744fd34e982633ced756fee0498ef7 (git)
  • a5a58fab556bfe618b4c9719eb85712d78c6cb10 (git)
  • 661c01b2181d9413c799127f13143583b69f20fd (git)
  • f42a9819ba84bed2e609a4dff56af37063dcabdc (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/md.c
Default Status
affected
Versions
Affected
  • 6.0
Unaffected
  • From 0 before 6.0 (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/24783dd06de870d646c25207bae186f78195f912
N/A
https://git.kernel.org/stable/c/338378dfffbdbb8d37a18f0a0c0358812671f91e
N/A
https://git.kernel.org/stable/c/cefcb9297fbdb6d94b61787b4f8d84f55b741470
N/A
Hyperlink: https://git.kernel.org/stable/c/24783dd06de870d646c25207bae186f78195f912
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/338378dfffbdbb8d37a18f0a0c0358812671f91e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cefcb9297fbdb6d94b61787b4f8d84f55b741470
Resource: N/A
Details not found