Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventpoll free to RCU grace period In certain situations, ep_free() in eventpoll.c will kfree the epi->ep eventpoll struct while it still being used by another concurrent thread. Defer the kfree() to an RCU callback to prevent UAF.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.4.1, < 6.6.136 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/07712db80857d5d09ae08f3df85a708ecfc3b61fPatch
- https://git.kernel.org/stable/c/5b1173b165421561db29f30afc7e97d940a398a9Patch
- https://git.kernel.org/stable/c/7e8083f5eeedab0f460063b9c2c14c9a4e71a427Patch
- https://git.kernel.org/stable/c/a6566cd33f6f967a7651ebf2ce0dd31572e319cfPatch
- https://git.kernel.org/stable/c/ae0bb9c1fb7c2594519aeeb096cf2c3b7837b322Patch
FAQ
What is CVE-2026-43074?
CVE-2026-43074 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventpoll free to RCU grace period In certain situations, ep_free() in eventpoll.c will kfree the epi->ep ...
How severe is CVE-2026-43074?
CVE-2026-43074 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43074?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.