CVE-2026-43277
Buffer Overflow in Linux Kernel APEI/GHES
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19.0-rc1-00002-gda407d200220 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's APEI/GHES subsystem, where the function ghes_new() attempts to prevent allocating records larger than a defined maximum size (64KB). However, the actual memory allocation is based on the number of pages from the CPER BIOS table, which can be smaller than the size checked. A malicious or faulty firmware could send data larger than the allocated memory, causing the kernel to access invalid memory and resulting in a kernel OOPS (crash).
How can this vulnerability impact me? :
The impact of this vulnerability is that a system running the affected Linux kernel could experience a kernel crash (OOPS) due to improper handling of CPER record sizes. This could lead to system instability, denial of service, or unexpected reboots if exploited by malicious firmware or corrupted data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel OOPS related to memory allocation issues in the APEI/GHES subsystem when handling CPER bios table records. Detection involves monitoring kernel logs for specific error messages indicating a kernel paging request failure or OOPS related to ghes_new() or CPER record handling.
You can check your system logs (e.g., using dmesg or journalctl) for error messages similar to the following:
- dmesg | grep -i 'Unable to handle kernel paging request'
- journalctl -k | grep -i 'Internal error: Oops'
- journalctl -k | grep -i 'ghes_new'
These commands help identify if the kernel has encountered the specific memory allocation fault caused by malformed CPER records from firmware.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to update the Linux kernel to a version that includes the fix for this vulnerability, which ensures proper allocation size checks for CPER bios table records in the APEI/GHES subsystem.
Until the kernel is updated, consider the following steps:
- Monitor and restrict firmware updates or configurations that might send malformed CPER data.
- Limit or disable ACPI error reporting features if feasible, to reduce exposure to the vulnerable code path.
- Ensure system backups and recovery plans are in place in case of kernel crashes.
However, the definitive solution is to apply the kernel patch that correctly handles CPER record allocation sizes.