Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2026-43469

Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
12/05/2026

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xprtrdma: Decrement re_receiving on the early exit paths<br /> <br /> In the event that rpcrdma_post_recvs() fails to create a work request<br /> (due to memory allocation failure, say) or otherwise exits early, we<br /> should decrement ep-&gt;re_receiving before returning. Otherwise we will<br /> hang in rpcrdma_xprt_drain() as re_receiving will never reach zero and<br /> the completion will never be triggered.<br /> <br /> On a system with high memory pressure, this can appear as the following<br /> hung task:<br /> <br /> INFO: task kworker/u385:17:8393 blocked for more than 122 seconds.<br /> Tainted: G S E 6.19.0 #3<br /> "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br /> task:kworker/u385:17 state:D stack:0 pid:8393 tgid:8393 ppid:2 task_flags:0x4248060 flags:0x00080000<br /> Workqueue: xprtiod xprt_autoclose [sunrpc]<br /> Call Trace:<br /> <br /> __schedule+0x48b/0x18b0<br /> ? ib_post_send_mad+0x247/0xae0 [ib_core]<br /> schedule+0x27/0xf0<br /> schedule_timeout+0x104/0x110<br /> __wait_for_common+0x98/0x180<br /> ? __pfx_schedule_timeout+0x10/0x10<br /> wait_for_completion+0x24/0x40<br /> rpcrdma_xprt_disconnect+0x444/0x460 [rpcrdma]<br /> xprt_rdma_close+0x12/0x40 [rpcrdma]<br /> xprt_autoclose+0x5f/0x120 [sunrpc]<br /> process_one_work+0x191/0x3e0<br /> worker_thread+0x2e3/0x420<br /> ? __pfx_worker_thread+0x10/0x10<br /> kthread+0x10d/0x230<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork+0x273/0x2b0<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork_asm+0x1a/0x30