CVE-2026-43499
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
21/05/2026
Última modificación:
21/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
rtmutex: Use waiter::task instead of current in remove_waiter()<br />
<br />
remove_waiter() is used by the slowlock paths, but it is also used for<br />
proxy-lock rollback in rt_mutex_start_proxy_lock() when invoked from<br />
futex_requeue().<br />
<br />
In the latter case waiter::task is not current, but remove_waiter()<br />
operates on current for the dequeue operation. That results in several<br />
problems:<br />
<br />
1) the rbtree dequeue happens without waiter::task::pi_lock being held<br />
<br />
2) the waiter task&#39;s pi_blocked_on state is not cleared, which leaves a<br />
dangling pointer primed for UAF around.<br />
<br />
3) rt_mutex_adjust_prio_chain() operates on the wrong top priority waiter<br />
task<br />
<br />
Use waiter::task instead of current in all related operations in<br />
remove_waiter() to cure those problems.<br />
<br />
[ tglx: Fixup rt_mutex_adjust_prio_chain(), add a comment and amend the<br />
changelog ]
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/3bfdc63936dd4773109b7b8c280c0f3b5ae7d349
- https://git.kernel.org/stable/c/3fb7394a837740770f0d6b4b30567e60786a63f2
- https://git.kernel.org/stable/c/6d52dfcb2a5db86e346cf51f8fcf2071b8085166
- https://git.kernel.org/stable/c/88614876370aac8ad1050ad785a4c095ba17ac11
- https://git.kernel.org/stable/c/8a1fc8d698ac5e5916e3082a0f74450d71f9611f



