CVE-2026-43271
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
md-cluster: fix NULL pointer dereference in process_metadata_update<br />
<br />
The function process_metadata_update() blindly dereferences the &#39;thread&#39;<br />
pointer (acquired via rcu_dereference_protected) within the wait_event()<br />
macro.<br />
<br />
While the code comment states "daemon thread must exist", there is a valid<br />
race condition window during the MD array startup sequence (md_run):<br />
<br />
1. bitmap_load() is called, which invokes md_cluster_ops->join().<br />
2. join() starts the "cluster_recv" thread (recv_daemon).<br />
3. At this point, recv_daemon is active and processing messages.<br />
4. However, mddev->thread (the main MD thread) is not initialized until<br />
later in md_run().<br />
<br />
If a METADATA_UPDATED message is received from a remote node during this<br />
specific window, process_metadata_update() will be called while<br />
mddev->thread is still NULL, leading to a kernel panic.<br />
<br />
To fix this, we must validate the &#39;thread&#39; pointer. If it is NULL, we<br />
release the held lock (no_new_dev_lockres) and return early, safely<br />
ignoring the update request as the array is not yet fully ready to<br />
process it.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/721599e837d3f4c0e6cc14da059612c017b6d3ec
- https://git.kernel.org/stable/c/a61c1bc84c4a0f1e7c2fe55b0f43d7d94af4adf1
- https://git.kernel.org/stable/c/dceb5a843910004cb118148e267036104fc3ee43
- https://git.kernel.org/stable/c/dec123825c1ed74d98fd5fc7571a851dea4f46ff
- https://git.kernel.org/stable/c/f150e753cb8dd756085f46e86f2c35ce472e0a3c



