CVE-2026-43132
dm-verity: correctly handle dm_bufio_client_create() failure
Description
In the Linux kernel, the following vulnerability has been resolved: dm-verity: correctly handle dm_bufio_client_create() failure If either of the calls to dm_bufio_client_create() in verity_fec_ctr() fails, then dm_bufio_client_destroy() is later called with an ERR_PTR() argument. That causes a crash. Fix this.
INFO
Published Date :
May 6, 2026, 12:16 p.m.
Last Modified :
May 8, 2026, 5:26 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Apply the kernel patch for dm-verity.
- Update the Linux kernel to a fixed version.
- Reboot the system after applying updates.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-43132.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-43132 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-43132
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-43132 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2026-43132 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
May. 08, 2026
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE NVD-CWE-noinfo Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.128 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.75 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.18.16 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.19 up to (excluding) 6.19.6 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.202 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.165 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.5 up to (excluding) 5.10.252 Added Reference Type kernel.org: https://git.kernel.org/stable/c/031f2adc1499b112a39ac316bbab3c80bba16cf2 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/119f4f04186fa4f33ee6bd39af145cdaff1ff17f Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/451cc650e40e8c3222d37877a9e4be0fcaacb9c8 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/5c2217ddb3b7e7ac25f4ebe9061258fc8f1c9167 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/6283e49af87a9c121bb01e5a64a7fe5706c210bc Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/9b8dc1d327e2928f3da59ced0595d850d31c0936 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/b154a868a3856fb5216c4f82981d8a503832e095 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/d3e1f1adc8a0289efe2d2cdc90edb8c6ffe0b5ef Types: Patch -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 06, 2026
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: dm-verity: correctly handle dm_bufio_client_create() failure If either of the calls to dm_bufio_client_create() in verity_fec_ctr() fails, then dm_bufio_client_destroy() is later called with an ERR_PTR() argument. That causes a crash. Fix this. Added Reference https://git.kernel.org/stable/c/031f2adc1499b112a39ac316bbab3c80bba16cf2 Added Reference https://git.kernel.org/stable/c/119f4f04186fa4f33ee6bd39af145cdaff1ff17f Added Reference https://git.kernel.org/stable/c/451cc650e40e8c3222d37877a9e4be0fcaacb9c8 Added Reference https://git.kernel.org/stable/c/5c2217ddb3b7e7ac25f4ebe9061258fc8f1c9167 Added Reference https://git.kernel.org/stable/c/6283e49af87a9c121bb01e5a64a7fe5706c210bc Added Reference https://git.kernel.org/stable/c/9b8dc1d327e2928f3da59ced0595d850d31c0936 Added Reference https://git.kernel.org/stable/c/b154a868a3856fb5216c4f82981d8a503832e095 Added Reference https://git.kernel.org/stable/c/d3e1f1adc8a0289efe2d2cdc90edb8c6ffe0b5ef