CVE-2026-43292

medium Red Hat
CVSS v3 Base Score
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS Score
0.0%
Exploitation probability in 30 days
Top 95% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
None
Integrity
None
Availability
High
Published: May 8, 2026 (6 days ago)
Last Modified: May 8, 2026
Vendor: Red Hat
Source: REDHAT

Description

A flaw was found in the Linux kernel. When the CONFIG_PAGE_OWNER option is enabled, the kernel's memory management (mm/vmalloc) component can experience Read-Copy-Update (RCU) stalls during virtual memory allocation cleanup. This occurs because freeing Kernel Address Sanitizer (KASAN) shadow pages triggers expensive stack unwinding operations that acquire RCU read locks. Processing a large number of pages without yielding the CPU can cause tasks to hold the CPU for extended periods, leading to RCU stalls and potential Out-Of-Memory (OOM) conditions, effectively resulting in a Denial of Service.

CWE

CWE-770

Affected Products

Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9

References