๐Ÿ” CVE Alert

CVE-2026-43266

UNKNOWN 0.0

EFI/CPER: don't go past the ARM processor CPER record buffer

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't go past the ARM processor CPER record buffer There's a logic inside GHES/CPER to detect if the section_length is too small, but it doesn't detect if it is too big. Currently, if the firmware receives an ARM processor CPER record stating that a section length is big, kernel will blindly trust section_length, producing a very long dump. For instance, a 67 bytes record with ERR_INFO_NUM set 46198 and section length set to 854918320 would dump a lot of data going a way past the firmware memory-mapped area. Fix it by adding a logic to prevent it to go past the buffer if ERR_INFO_NUM is too big, making it report instead: [Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 1 [Hardware Error]: event severity: recoverable [Hardware Error]: Error 0, type: recoverable [Hardware Error]: section_type: ARM processor error [Hardware Error]: MIDR: 0xff304b2f8476870a [Hardware Error]: section length: 854918320, CPER size: 67 [Hardware Error]: section length is too big [Hardware Error]: firmware-generated error record is incorrect [Hardware Error]: ERR_INFO_NUM is 46198 [ rjw: Subject and changelog tweaks ]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 6, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c80113dcfc807308f5ab33847fae77e07531aeb8 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < ca2aad8771aa9091bc9e42e7d546bd40b72ddcd4 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a68d22902a6916e10ee235fee609239004e129d0 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 64eb63f573f497553e1a0c388bbcdd639e0f0704 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < be10c1bdf64a39832998f54900aa309b3917abcf 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 25b290624b0e3d2f0f90238709ee0b6009b9fde8 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 45766863baf899059e75595dd3cb1116467f2095 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < eae21beecb95a3b69ee5c38a659f774e171d730e
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c80113dcfc807308f5ab33847fae77e07531aeb8 git.kernel.org: https://git.kernel.org/stable/c/ca2aad8771aa9091bc9e42e7d546bd40b72ddcd4 git.kernel.org: https://git.kernel.org/stable/c/a68d22902a6916e10ee235fee609239004e129d0 git.kernel.org: https://git.kernel.org/stable/c/64eb63f573f497553e1a0c388bbcdd639e0f0704 git.kernel.org: https://git.kernel.org/stable/c/be10c1bdf64a39832998f54900aa309b3917abcf git.kernel.org: https://git.kernel.org/stable/c/25b290624b0e3d2f0f90238709ee0b6009b9fde8 git.kernel.org: https://git.kernel.org/stable/c/45766863baf899059e75595dd3cb1116467f2095 git.kernel.org: https://git.kernel.org/stable/c/eae21beecb95a3b69ee5c38a659f774e171d730e