CVE-2026-43079
Awaiting Analysis Awaiting Analysis - Queue
perf/x86/intel/uncore Array Overflow in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Skip discovery table for offline dies This warning can be triggered if NUMA is disabled and the system boots with fewer CPUs than the number of CPUs in die 0. WARNING: CPU: 9 PID: 7257 at uncore.c:1157 uncore_pci_pmu_register+0x136/0x160 [intel_uncore] Currently, the discovery table continues to be parsed even if all CPUs in the associated die are offline. This can lead to an array overflow at "pmu->boxes[die] = box" in uncore_pci_pmu_register(), which may trigger the warning above or cause other issues.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's perf subsystem for Intel uncore performance monitoring. Specifically, when NUMA is disabled and the system boots with fewer CPUs than expected in die 0, the discovery table for offline dies is still parsed.

Because the discovery table continues to be parsed even if all CPUs in a die are offline, it can lead to an array overflow at the code location pmu->boxes[die] = box in the function uncore_pci_pmu_register().

This overflow can trigger warnings or potentially cause other issues related to system stability or security.


How can this vulnerability impact me? :

The vulnerability can cause an array overflow in the Linux kernel's performance monitoring code, which may trigger system warnings or lead to other unspecified issues.

Such an overflow could potentially affect system stability or reliability, possibly causing crashes or unexpected behavior.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by observing specific kernel warning messages related to the intel_uncore module. In particular, the warning message "WARNING: CPU: <number> PID: <number> at uncore.c:1157 uncore_pci_pmu_register+0x136/0x160 [intel_uncore]" indicates the issue.

To detect this on your system, you can check the kernel logs for such warnings using commands like:

  • dmesg | grep -i 'uncore_pci_pmu_register'
  • journalctl -k | grep -i 'uncore_pci_pmu_register'
  • grep -i 'uncore_pci_pmu_register' /var/log/kern.log

These commands search for the warning message in kernel logs, which can help identify if the vulnerability is present due to the array overflow condition triggered when CPUs in a die are offline.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart