CVE-2026-43200
PCI Endpoint Parameter Swap in Linux Kernel
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's PCI endpoint code where two functions, pci_primary_epc_epf_unlink() and pci_secondary_epc_epf_unlink(), have their parameters swapped incorrectly compared to the expected order defined by struct configfs_item_operations callbacks.
Because of this parameter swap, when the unlink command is used in configfs, it causes a kernel crash due to an invalid memory access (kernel paging request failure). This crash occurs during the unlink operation, leading to instability in the kernel.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when the unlink command is executed in configfs related to PCI endpoint functions. Such a crash can lead to system instability, potential denial of service, and unexpected reboots or downtime.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability causes a kernel crash when using the unlink command in configfs due to swapped parameters in pci_primary_epc_epf_unlink() and pci_secondary_epc_epf_unlink() functions.
Detection can involve monitoring for kernel crash logs or messages related to "Unable to handle kernel paging request" or crashes involving pci_epf_unbind, configfs_unlink, or vfs_unlink functions.
Specifically, checking kernel logs (e.g., using dmesg) for crash traces similar to the following can indicate the presence of this issue:
- dmesg | grep -i 'Unable to handle kernel paging request'
- dmesg | grep -E 'pci_epf_unbind|configfs_unlink|vfs_unlink'
Additionally, attempting to use the unlink command in configfs and observing if it triggers a kernel crash can help confirm the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by fixing the swapped parameters in the pci_primary_epc_epf_unlink() and pci_secondary_epc_epf_unlink() functions in the Linux kernel.
Immediate mitigation steps include:
- Update the Linux kernel to a version that includes the fix for this vulnerability.
- Avoid using the unlink command in configfs on affected kernel versions until the patch is applied.
- Monitor system stability and kernel logs for crashes related to this issue.