VYPR
High severity7.1NVD Advisory· Published May 1, 2026· Updated May 12, 2026

CVE-2026-43006

CVE-2026-43006

Description

In the Linux kernel, the following vulnerability has been resolved:

io_uring/rsrc: reject zero-length fixed buffer import

validate_fixed_range() admits buf_addr at the exact end of the registered region when len is zero, because the check uses strict greater-than (buf_end > imu->ubuf + imu->len). io_import_fixed() then computes offset == imu->len, which causes the bvec skip logic to advance past the last bio_vec entry and read bv_offset from out-of-bounds slab memory.

Return early from io_import_fixed() when len is zero. A zero-length import has no data to transfer and should not walk the bvec array at all.

BUG: KASAN: slab-out-of-bounds in io_import_reg_buf+0x697/0x7f0 Read of size 4 at addr ffff888002bcc254 by task poc/103 Call Trace: io_import_reg_buf+0x697/0x7f0 io_write_fixed+0xd9/0x250 __io_issue_sqe+0xad/0x710 io_issue_sqe+0x7d/0x1100 io_submit_sqes+0x86a/0x23c0 __do_sys_io_uring_enter+0xa98/0x1590 Allocated by task 103: The buggy address is located 12 bytes to the right of allocated 584-byte region [ffff888002bcc000, ffff888002bcc248)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

io_uring in Linux kernel mishandles zero-length fixed-buffer imports, leading to a slab-out-of-bounds read that can be triggered by a local user.

Vulnerability

CVE-2026-43006 is a slab-out-of-bounds read in the Linux kernel's io_uring subsystem. The vulnerability arises in io_import_fixed(), which processes fixed-buffer imports for I/O operations. When a user submits a zero-length buffer import (len == 0), the function validate_fixed_range() incorrectly allows the buffer address at the exact end of a registered region. This causes io_import_fixed() to compute an offset equal to the registered region's length (imu->len), and then the bvec skip logic advances past the last valid bio_vec entry, reading bv_offset from out-of-bounds slab memory [1].

Exploitation

An attacker must have the ability to submit io_uring IOCTL calls, which typically requires local user access with permissions to open /dev/io_uring and register fixed buffers. No special privileges beyond those needed for using io_uring are required. The attack surface is local; a remote attacker cannot directly exploit this without local shell access. The exploit triggers the out-of-bounds read via carefully crafted io_uring submission queue entries (SQEs) that specify zero-length fixed-buffer reads or writes [1].

Impact

Successful exploitation results in a KASAN-detected slab-out-of-bounds read, which can leak sensitive kernel memory contents (including slab data) or cause a kernel crash (denial of service) [1]. The vulnerability is rated HIGH (CVSS 7.1) reflecting the potential for information disclosure or system instability.

Mitigation

The fix, committed to the Linux kernel stable branches, adds an early return from io_import_fixed() when len is zero, preventing the out-of-bounds bvec access [1]. System administrators should apply the updated kernel packages as soon as they are available for their distribution. No workaround exists other than restricting local access to io_uring (e.g., via seccomp or LSM policies).

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

8
  • Linux/Kernelinferred8 versions
    (expand)+ 7 more
    • (no CPE)
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.15,<6.18.22
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

News mentions

0

No linked articles in our index yet.