CVE-2026-43150
perf/arm-cmn Rejects Unsupported Hardware Configurations
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's perf subsystem for ARM CMN (Coherent Mesh Network) hardware configurations. Previously, the kernel was lenient in accepting unknown CMN models or revisions, assuming they would be similar enough to known configurations. However, this assumption could lead to issues because new hardware might have larger sizes or different numbers of components, potentially causing array overflows and memory corruption.
The fix ensures that the kernel rejects unsupported or unknown hardware configurations rather than trying to operate on them, preventing the risk of memory corruption by only running on hardware that matches expected assumptions.
How can this vulnerability impact me? :
If the Linux kernel accepts unsupported or unknown ARM CMN hardware configurations without proper checks, it could lead to memory corruption due to array overflows. This can cause system instability, crashes, or potentially allow an attacker to exploit the memory corruption to execute arbitrary code or cause denial of service.
By rejecting unsupported hardware configurations, the vulnerability fix reduces the risk of such memory corruption and its associated impacts.