CVE-2026-43449
Buffer Overflow in Linux Kernel NVMe PCI Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-out-of-bounds error in the Linux kernel's NVMe PCI driver, specifically in the nvme_dbbuf_set function. It occurs because the code incorrectly handles the index range for online queues, allowing an index to go beyond the valid range. This leads to accessing memory outside the allocated buffer, which can cause memory corruption or crashes.
How can this vulnerability impact me? :
The impact of this vulnerability includes potential memory corruption due to out-of-bounds access in the NVMe PCI driver. This can lead to system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service by exploiting the memory corruption.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to a slab-out-of-bounds error in the Linux kernel's nvme-pci driver, specifically in nvme_dbbuf_set and nvme_dbbuf_free functions. Detection would typically involve monitoring kernel logs for KASAN (Kernel Address Sanitizer) error messages indicating slab-out-of-bounds in the nvme driver.
You can check your system logs for KASAN reports using commands such as:
- dmesg | grep -i kasan
- journalctl -k | grep -i kasan
These commands will help identify if the kernel has reported slab-out-of-bounds errors related to the nvme driver, which is indicative of this vulnerability being triggered.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed by a patch that corrects the loop condition in the nvme-pci driver to prevent out-of-bounds access. Immediate mitigation steps include updating your Linux kernel to a version that includes this fix.
If updating the kernel is not immediately possible, consider disabling or limiting the use of NVMe devices or drivers until the patch can be applied, as the vulnerability is specific to the nvme-pci driver.
Monitoring kernel logs for KASAN errors can also help detect exploitation attempts.