CVE-2026-43073
Misleadingly Named Memory Copy Function in Linux Kernel
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a misleadingly named function in the Linux kernel called '__copy_user_nocache()'. The function's name suggests it performs a non-cached copy from user space, but in reality, it neither performs a non-cached copy nor strictly copies from user space. Instead, it is a specialized memory copy routine that uses non-temporal stores for the destination and handles exceptions for both source and destination accesses.
The function was originally intended to copy data from user space into a non-cached kernel buffer, particularly for fragile persistent memory targets that require non-temporal stores to handle machine check exceptions gracefully. However, some drivers misused this function as a performance tweak for kernel copies without proper exception handling.
The vulnerability was addressed by renaming the function to better reflect its actual behavior, changing its prototype to require proper user pointer conversion, and correcting its usage in kernel code to prevent misuse.
How can this vulnerability impact me? :
The vulnerability could lead to improper handling of memory copies within the Linux kernel, especially where the function was misused by drivers for kernel copies without proper exception handling. This misuse might cause unexpected behavior or instability in the kernel, particularly when dealing with fragile persistent memory.
Since the function handles exceptions for both source and destination accesses, incorrect use could potentially lead to kernel crashes or data corruption if machine check exceptions are not properly managed.