CVE-2026-43201
Memory Corruption in Linux Kernel APEI/GHES
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.18.0-rc1-00017-gabadcc3553dd-dirty |
| linux | linux_kernel | From 6.18.0-rc1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's handling of ARM processor errors reported via the APEI/GHES interface. Specifically, if the BIOS generates a very small or incomplete ARM Processor Error record, the kernel's current logic fails to properly check the sizes of certain error sections before accessing them. This can lead to attempts to access memory beyond what was allocated, causing kernel crashes (OOPSes). The issue arises because the code does not adequately verify the section_length and context_info size fields before dereferencing them.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash unexpectedly when processing certain ARM processor error records generated by the BIOS. Such crashes (kernel OOPSes) can lead to system instability, potential data loss, and downtime. Systems running vulnerable kernel versions on ARM architectures may experience reliability issues if exposed to malformed or incomplete hardware error reports.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as kernel OOPS errors related to ARM processor error handling in the Linux kernel. Detection involves monitoring system logs for specific error messages indicating internal errors or OOPSes caused by ARM processor error records.
- Check kernel logs for messages similar to: "Internal error: Oops: 0000000096000005" or errors referencing functions like log_arm_hw_error or ghes_handle_arm_hw_error.
- Use the command: dmesg | grep -i 'Oops' to filter kernel OOPS messages.
- Use journalctl -k | grep -i 'arm_hw_error' to find hardware error logs related to ARM processor errors.
- Monitor system logs in /var/log/kern.log or /var/log/messages for similar error patterns.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by adding checks in the Linux kernel to avoid accessing memory beyond allocated sections when handling ARM processor errors. Immediate mitigation involves updating the Linux kernel to a version that includes this fix.
- Apply the latest Linux kernel updates or patches that address this specific ARM processor error handling issue.
- If updating immediately is not possible, monitor for the described kernel OOPS errors and consider limiting workloads that trigger ARM processor error handling.
- Review BIOS updates from your hardware vendor that might prevent generation of incomplete ARM processor error records.