CVE-2026-43271
NULL Pointer Dereference in Linux Kernel MD Cluster
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's md-cluster component, specifically in the function process_metadata_update(). The function dereferences a 'thread' pointer without checking if it is NULL, which can happen during a race condition in the MD array startup sequence. If a METADATA_UPDATED message is received before the main MD thread is initialized, the function tries to use a NULL pointer, causing a kernel panic.
The issue arises because the 'thread' pointer is assumed to always exist, but during startup, there is a window where the 'recv_daemon' thread is active while the main MD thread is still NULL. The fix involves validating the 'thread' pointer and safely ignoring update requests if the array is not fully ready.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic, which leads to a system crash. Such a crash can result in downtime, potential data loss, and disruption of services running on the affected Linux system. It affects systems using the md-cluster functionality during the startup of MD arrays.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is caused by a NULL pointer dereference in the Linux kernel's md-cluster module during the MD array startup sequence.
To mitigate this vulnerability, ensure that your Linux kernel is updated to a version where the fix has been applied. The fix involves validating the 'thread' pointer in process_metadata_update() and safely ignoring update requests if the array is not fully ready.
Until you can update, avoid scenarios where METADATA_UPDATED messages might be received during the MD array startup sequence, as this triggers the issue.