๐Ÿ” CVE Alert

CVE-2026-43271

UNKNOWN 0.0

md-cluster: fix NULL pointer dereference in process_metadata_update

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: md-cluster: fix NULL pointer dereference in process_metadata_update The function process_metadata_update() blindly dereferences the 'thread' pointer (acquired via rcu_dereference_protected) within the wait_event() macro. While the code comment states "daemon thread must exist", there is a valid race condition window during the MD array startup sequence (md_run): 1. bitmap_load() is called, which invokes md_cluster_ops->join(). 2. join() starts the "cluster_recv" thread (recv_daemon). 3. At this point, recv_daemon is active and processing messages. 4. However, mddev->thread (the main MD thread) is not initialized until later in md_run(). If a METADATA_UPDATED message is received from a remote node during this specific window, process_metadata_update() will be called while mddev->thread is still NULL, leading to a kernel panic. To fix this, we must validate the 'thread' pointer. If it is NULL, we release the held lock (no_new_dev_lockres) and return early, safely ignoring the update request as the array is not yet fully ready to process it.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 6, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a61c1bc84c4a0f1e7c2fe55b0f43d7d94af4adf1 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < dec123825c1ed74d98fd5fc7571a851dea4f46ff 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 721599e837d3f4c0e6cc14da059612c017b6d3ec 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < dceb5a843910004cb118148e267036104fc3ee43 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f150e753cb8dd756085f46e86f2c35ce472e0a3c
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a61c1bc84c4a0f1e7c2fe55b0f43d7d94af4adf1 git.kernel.org: https://git.kernel.org/stable/c/dec123825c1ed74d98fd5fc7571a851dea4f46ff git.kernel.org: https://git.kernel.org/stable/c/721599e837d3f4c0e6cc14da059612c017b6d3ec git.kernel.org: https://git.kernel.org/stable/c/dceb5a843910004cb118148e267036104fc3ee43 git.kernel.org: https://git.kernel.org/stable/c/f150e753cb8dd756085f46e86f2c35ce472e0a3c