Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: md-cluster: fix NULL pointer dereference in process_metadata_update The function process_metadata_update() blindly dereferences the 'thread' pointer (acquired via rcu_dereference_protected) within the wait_event() macro. While the code comment states "daemon thread must exist", there is a valid race condition window during the MD array startup sequence (md_run): 1. bitmap_load() is called, which invokes md_cluster_ops->join(). 2. join() starts the "cluster_recv" thread (recv_daemon). 3. At this point, recv_daemon is active and processing messages. 4. However, mddev->thread (the main MD thread) is not initialized until later in md_run(). If a METADATA_UPDATED message is received from a remote node during this specific window, process_metadata_update() will be called while mddev->thread is still NULL, leading to a kernel panic. To fix this, we must validate the 'thread' pointer. If it is NULL, we release the held lock (no_new_dev_lockres) and return early, safely ignoring the update request as the array is not yet fully ready to process it.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.12, < 6.6.128 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/721599e837d3f4c0e6cc14da059612c017b6d3ecPatch
- https://git.kernel.org/stable/c/a61c1bc84c4a0f1e7c2fe55b0f43d7d94af4adf1Patch
- https://git.kernel.org/stable/c/dceb5a843910004cb118148e267036104fc3ee43Patch
- https://git.kernel.org/stable/c/dec123825c1ed74d98fd5fc7571a851dea4f46ffPatch
- https://git.kernel.org/stable/c/f150e753cb8dd756085f46e86f2c35ce472e0a3cPatch
FAQ
What is CVE-2026-43271?
CVE-2026-43271 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: md-cluster: fix NULL pointer dereference in process_metadata_update The function process_metadata_update() blindly dereferences th...
How severe is CVE-2026-43271?
CVE-2026-43271 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43271?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.