5.5
MEDIUM CVSS 3.1
CVE-2026-43132
dm-verity: correctly handle dm_bufio_client_create() failure
Description

In the Linux kernel, the following vulnerability has been resolved: dm-verity: correctly handle dm_bufio_client_create() failure If either of the calls to dm_bufio_client_create() in verity_fec_ctr() fails, then dm_bufio_client_destroy() is later called with an ERR_PTR() argument. That causes a crash. Fix this.

INFO

Published Date :

May 6, 2026, 12:16 p.m.

Last Modified :

May 8, 2026, 5:26 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2026-43132 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
Fix a kernel crash caused by incorrect error handling in dm-verity.
  • Apply the kernel patch for dm-verity.
  • Update the Linux kernel to a fixed version.
  • Reboot the system after applying updates.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-43132 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-43132 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-43132 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-43132 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    May. 08, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.128 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.75 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.18.16 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.19 up to (excluding) 6.19.6 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.202 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.165 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.5 up to (excluding) 5.10.252
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/031f2adc1499b112a39ac316bbab3c80bba16cf2 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/119f4f04186fa4f33ee6bd39af145cdaff1ff17f Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/451cc650e40e8c3222d37877a9e4be0fcaacb9c8 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/5c2217ddb3b7e7ac25f4ebe9061258fc8f1c9167 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/6283e49af87a9c121bb01e5a64a7fe5706c210bc Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/9b8dc1d327e2928f3da59ced0595d850d31c0936 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/b154a868a3856fb5216c4f82981d8a503832e095 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/d3e1f1adc8a0289efe2d2cdc90edb8c6ffe0b5ef Types: Patch
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 06, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: dm-verity: correctly handle dm_bufio_client_create() failure If either of the calls to dm_bufio_client_create() in verity_fec_ctr() fails, then dm_bufio_client_destroy() is later called with an ERR_PTR() argument. That causes a crash. Fix this.
    Added Reference https://git.kernel.org/stable/c/031f2adc1499b112a39ac316bbab3c80bba16cf2
    Added Reference https://git.kernel.org/stable/c/119f4f04186fa4f33ee6bd39af145cdaff1ff17f
    Added Reference https://git.kernel.org/stable/c/451cc650e40e8c3222d37877a9e4be0fcaacb9c8
    Added Reference https://git.kernel.org/stable/c/5c2217ddb3b7e7ac25f4ebe9061258fc8f1c9167
    Added Reference https://git.kernel.org/stable/c/6283e49af87a9c121bb01e5a64a7fe5706c210bc
    Added Reference https://git.kernel.org/stable/c/9b8dc1d327e2928f3da59ced0595d850d31c0936
    Added Reference https://git.kernel.org/stable/c/b154a868a3856fb5216c4f82981d8a503832e095
    Added Reference https://git.kernel.org/stable/c/d3e1f1adc8a0289efe2d2cdc90edb8c6ffe0b5ef
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.