CVE-2026-43006
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
01/05/2026
Last modified:
12/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring/rsrc: reject zero-length fixed buffer import<br />
<br />
validate_fixed_range() admits buf_addr at the exact end of the<br />
registered region when len is zero, because the check uses strict<br />
greater-than (buf_end > imu->ubuf + imu->len). io_import_fixed()<br />
then computes offset == imu->len, which causes the bvec skip logic<br />
to advance past the last bio_vec entry and read bv_offset from<br />
out-of-bounds slab memory.<br />
<br />
Return early from io_import_fixed() when len is zero. A zero-length<br />
import has no data to transfer and should not walk the bvec array<br />
at all.<br />
<br />
BUG: KASAN: slab-out-of-bounds in io_import_reg_buf+0x697/0x7f0<br />
Read of size 4 at addr ffff888002bcc254 by task poc/103<br />
Call Trace:<br />
io_import_reg_buf+0x697/0x7f0<br />
io_write_fixed+0xd9/0x250<br />
__io_issue_sqe+0xad/0x710<br />
io_issue_sqe+0x7d/0x1100<br />
io_submit_sqes+0x86a/0x23c0<br />
__do_sys_io_uring_enter+0xa98/0x1590<br />
Allocated by task 103:<br />
The buggy address is located 12 bytes to the right of<br />
allocated 584-byte region [ffff888002bcc000, ffff888002bcc248)
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



