Home

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: add missing RCU unlock in error path in try_release_subpage_extent_buffer() Call rcu_read_lock() before exiting the loop in try_release_subpage_extent_buffer() because there is a rcu_read_unlock() call past the loop. This has been detected by the Clang thread-safety analyzer.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-08 | Updated 2026-05-08 | Assigner Linux

Product status

Default status
unaffected

ad580dfa388fabb52af033e3f8cc5d04be985e54 (git) before 5e1ab71f74a1e61f1254dff128a764fdebaec0b8
affected

ad580dfa388fabb52af033e3f8cc5d04be985e54 (git) before 35b0c8768e848e1b7e32052db36b5fa59b6a33a1
affected

ad580dfa388fabb52af033e3f8cc5d04be985e54 (git) before b2840e33127ce0eea880504b7f133e780f567a9b
affected

10ec363cfefeeb77fda4c1ac20a531f21de45264 (git)
affected

Default status
affected

6.17
affected

Any version before 6.17
unaffected

6.18.19 (semver)
unaffected

6.19.9 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5e1ab71f74a1e61f1254dff128a764fdebaec0b8

git.kernel.org/...c/35b0c8768e848e1b7e32052db36b5fa59b6a33a1

git.kernel.org/...c/b2840e33127ce0eea880504b7f133e780f567a9b

cve.org (CVE-2026-43358)

nvd.nist.gov (CVE-2026-43358)

Download JSON