CVE-2026-43278
Double-Free in Linux Kernel Device Mapper
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's device-mapper (dm) subsystem. It involves a flaw where cloned request bio pointers are not cleared properly when the last cloned bio completes. This leads to stale bio pointers causing double-initialization of cloned bios, which in turn can cause use-after-free and double-free memory errors.
Specifically, when using dm-multipath on top of a PCIe NVMe namespace, cloned request bios are freed during the completion of a block request, but the original bio pointer in the request structure remains set. Later, when the clone teardown process runs, it attempts to free these bios again, causing a double-free scenario.
The fix involves clearing the bio pointer in the clone request once the last cloned bio completes, preventing the second free attempt and avoiding the use-after-free and double-free issues.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption issues such as use-after-free and double-free errors in the Linux kernel's device-mapper subsystem. Such memory errors can cause system instability, crashes, or potentially allow an attacker to execute arbitrary code with kernel privileges.
If exploited, it could compromise the integrity and availability of systems using dm-multipath on PCIe NVMe devices, potentially leading to denial of service or escalation of privileges.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by clearing the cloned request bio pointer when the last cloned bio completes, preventing double-free scenarios.
To mitigate this vulnerability immediately, update your Linux kernel to a version that includes this fix.