CVE-2026-43041 PUBLISHED

net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak

Assigner: Linux
Reserved: 01.05.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak

__radix_tree_create() allocates and links intermediate nodes into the tree one by one. If a subsequent allocation fails, the already-linked nodes remain in the tree with no corresponding leaf entry. These orphaned internal nodes are never reclaimed because radix_tree_for_each_slot() only visits slots containing leaf values.

The radix_tree API is deprecated in favor of xarray. As suggested by Matthew Wilcox, migrate qrtr_tx_flow from radix_tree to xarray instead of fixing the radix_tree itself [1]. xarray properly handles cleanup of internal nodes — xa_destroy() frees all internal xarray nodes when the qrtr_node is released, preventing the leak.

[1] https://lore.kernel.org/all/20260225071623.41275-1-jiayuan.chen@linux.dev/T/

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to f2dd9aaf6e2861337f5835f877a5b2becaf4b015 (excl.)
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to 4b75ff0aedd6ade1018ad4a3a9d8336794e36e42 (excl.)
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to ff134cc43972d7ddceff8cfd36cf6b9eaafc00b3 (excl.)
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to 0fda873092b541bb5a9b87d728a2429f863f8cfa (excl.)
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to 69402908e277dd164bf8d7c8fd0513c0fac28e9e (excl.)
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to f2664bc4f0f356f17c2094587a2b3665e3867e44 (excl.)
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to 5d2249eefaca59908fe3c264b8eca526424dcfbe (excl.)
  • affected from 5fdeb0d372ab33b4175043a2a4a1730239a217f1 to 2428083101f6883f979cceffa76cd8440751ffe6 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 5.6 is affected
  • unaffected from 0 to 5.6 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.168 to 6.1.* (incl.)
  • unaffected from 6.6.134 to 6.6.* (incl.)
  • unaffected from 6.12.81 to 6.12.* (incl.)
  • unaffected from 6.18.22 to 6.18.* (incl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References