VYPR
Medium severity5.5NVD Advisory· Published May 6, 2026· Updated May 11, 2026

CVE-2026-43192

CVE-2026-43192

Description

In the Linux kernel, the following vulnerability has been resolved:

dm mpath: Add missing dm_put_device when failing to get scsi dh name

When commit fd81bc5cca8f ("scsi: device_handler: Return error pointer in scsi_dh_attached_handler_name()") added code to fail parsing the path if scsi_dh_attached_handler_name() failed with -ENOMEM, it didn't clean up the reference to the path device that had just been taken. Fix this, and steamline the error paths of parse_path() a little.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing dm_put_device in Linux kernel dm-mpath on SCSI device handler name allocation failure leads to reference leak.

Vulnerability

Details

CVE-2026-43192 is a memory reference leak in the Linux kernel's device mapper multipath (dm-mpath) subsystem. When commit fd81bc5cca8f introduced error handling for scsi_dh_attached_handler_name() failure (e.g., -ENOMEM), the code failed to release the reference to the path device obtained earlier via dm_get_device. This oversight means that on certain error conditions during path parsing in parse_path(), the device reference count is not decremented, leading to a resource leak.

Exploitation

An attacker would need local access to the system to trigger the vulnerable code path. The issue occurs when the system attempts to parse a multipath device and the SCSI device handler name allocation fails due to memory pressure. No special privileges beyond the ability to cause device mapper events are required, but the attacker must be able to influence memory allocation failures or device handler attachment. The vulnerability is primarily a bug in error handling, making exploitation for denial-of-service or resource exhaustion plausible.

Impact

If triggered repeatedly, the leak can exhaust kernel memory or prevent device removal, leading to system instability. The CVSS v3 score of 5.5 (Medium) reflects the localized nature of the vulnerability and the requirement for local access. There is no evidence of remote exploitation or privilege escalation.

Mitigation

The fix was included in upstream Linux kernel stable trees via commits [1] and [2]. Administrators should apply the latest stable kernel updates to ensure the fix is deployed. No workarounds are documented; relying on patched kernels is the recommended action.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: >=6.19,<6.19.6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.