CVE-2026-43197
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
06/05/2026
Last modified:
11/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netconsole: avoid OOB reads, msg is not nul-terminated<br />
<br />
msg passed to netconsole from the console subsystem is not guaranteed<br />
to be nul-terminated. Before recent<br />
commit 7eab73b18630 ("netconsole: convert to NBCON console infrastructure")<br />
the message would be placed in printk_shared_pbufs, a static global<br />
buffer, so KASAN had harder time catching OOB accesses. Now we see:<br />
<br />
printk: console [netcon_ext0] enabled<br />
BUG: KASAN: slab-out-of-bounds in string+0x1f7/0x240<br />
Read of size 1 at addr ffff88813b6d4c00 by task pr/netcon_ext0/594<br />
<br />
CPU: 65 UID: 0 PID: 594 Comm: pr/netcon_ext0 Not tainted 6.19.0-11754-g4246fd6547c9<br />
Call Trace:<br />
kasan_report+0xe4/0x120<br />
string+0x1f7/0x240<br />
vsnprintf+0x655/0xba0<br />
scnprintf+0xba/0x120<br />
netconsole_write+0x3fe/0xa10<br />
nbcon_emit_next_record+0x46e/0x860<br />
nbcon_kthread_func+0x623/0x750<br />
<br />
Allocated by task 1:<br />
nbcon_alloc+0x1ea/0x450<br />
register_console+0x26b/0xe10<br />
init_netconsole+0xbb0/0xda0<br />
<br />
The buggy address belongs to the object at ffff88813b6d4000<br />
which belongs to the cache kmalloc-4k of size 4096<br />
The buggy address is located 0 bytes to the right of<br />
allocated 3072-byte region [ffff88813b6d4000, ffff88813b6d4c00)
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.18.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



