CVE-2026-43266
Description
In the Linux kernel, the following vulnerability has been resolved:
EFI/CPER: don't go past the ARM processor CPER record buffer
There's a logic inside GHES/CPER to detect if the section_length is too small, but it doesn't detect if it is too big.
Currently, if the firmware receives an ARM processor CPER record stating that a section length is big, kernel will blindly trust section_length, producing a very long dump. For instance, a 67 bytes record with ERR_INFO_NUM set 46198 and section length set to 854918320 would dump a lot of data going a way past the firmware memory-mapped area.
Fix it by adding a logic to prevent it to go past the buffer if ERR_INFO_NUM is too big, making it report instead:
[Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 1 [Hardware Error]: event severity: recoverable [Hardware Error]: Error 0, type: recoverable [Hardware Error]: section_type: ARM processor error [Hardware Error]: MIDR: 0xff304b2f8476870a [Hardware Error]: section length: 854918320, CPER size: 67 [Hardware Error]: section length is too big [Hardware Error]: firmware-generated error record is incorrect [Hardware Error]: ERR_INFO_NUM is 46198
[ rjw: Subject and changelog tweaks ]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel CPER handler trusts oversized section_length from firmware, causing out-of-bounds read; fix adds bounds check.
Vulnerability
Description
In the Linux kernel, the GHES/CPER (Generic Hardware Error Source / Common Platform Error Record) handler for ARM processor errors lacks proper validation of the section_length field. While existing logic detects if section_length is too small, it does not check for excessively large values. If firmware provides a malformed CPER record with an inflated section_length and a large ERR_INFO_NUM, the kernel blindly trusts these values, leading to an out-of-bounds memory read beyond the firmware-mapped region [1].
Exploitation
Scenario
An attacker with the ability to inject or manipulate firmware-provided error records (e.g., via physical access, compromised firmware, or a malicious hypervisor) can trigger this vulnerability. No special privileges on the host are required beyond the ability to deliver a crafted CPER record to the kernel's error handling path. The attack surface is limited to systems using ACPI APEI (Advanced Configuration and Power Interface / ACPI Platform Error Interface) with ARM processor error source tables.
Impact
A successful exploit causes the kernel to read and potentially dump an excessive amount of memory from the firmware area, potentially leaking sensitive data or causing a denial of service via log flooding or system instability. The issue is classified as medium severity (CVSS 5.5) due to the requirement of local or adjacent access and the resulting information disclosure.
Mitigation
The fix introduces a check that prevents the kernel from iterating beyond the CPER record buffer when ERR_INFO_NUM is too large. If the size is invalid, the kernel now logs a clear error message and stops processing. The patch has been applied to the stable kernel trees [1]. Users should update to a kernel version containing the fix (e.g., commits referenced in stable repositories).
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/25b290624b0e3d2f0f90238709ee0b6009b9fde8nvdPatch
- git.kernel.org/stable/c/45766863baf899059e75595dd3cb1116467f2095nvdPatch
- git.kernel.org/stable/c/64eb63f573f497553e1a0c388bbcdd639e0f0704nvdPatch
- git.kernel.org/stable/c/a68d22902a6916e10ee235fee609239004e129d0nvdPatch
- git.kernel.org/stable/c/be10c1bdf64a39832998f54900aa309b3917abcfnvdPatch
- git.kernel.org/stable/c/c80113dcfc807308f5ab33847fae77e07531aeb8nvdPatch
- git.kernel.org/stable/c/ca2aad8771aa9091bc9e42e7d546bd40b72ddcd4nvdPatch
- git.kernel.org/stable/c/eae21beecb95a3b69ee5c38a659f774e171d730envdPatch
News mentions
0No linked articles in our index yet.