CVE-2026-43201 PUBLISHED

APEI/GHES: ARM processor Error: don't go past allocated memory

Assigner: Linux
Reserved: 01.05.2026 Published: 06.05.2026 Updated: 06.05.2026

In the Linux kernel, the following vulnerability has been resolved:

APEI/GHES: ARM processor Error: don't go past allocated memory

If the BIOS generates a very small ARM Processor Error, or an incomplete one, the current logic will fail to deferrence

<pre>err->section_length </pre>

and ctx_info->size

Add checks to avoid that. With such changes, such GHESv2 records won't cause OOPSes like this:

[ 1.492129] Internal error: Oops: 0000000096000005 [#1] SMP [ 1.495449] Modules linked in: [ 1.495820] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:0 Not tainted 6.18.0-rc1-00017-gabadcc3553dd-dirty #18 PREEMPT [ 1.496125] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 02/02/2022 [ 1.496433] Workqueue: kacpi_notify acpi_os_execute_deferred [ 1.496967] pstate: 814000c5 (Nzcv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1.497199] pc : log_arm_hw_error+0x5c/0x200 [ 1.497380] lr : ghes_handle_arm_hw_error+0x94/0x220

0xffff8000811c5324 is in log_arm_hw_error (../drivers/ras/ras.c:75). 70 err_info = (struct cper_arm_err_info )(err + 1); 71 ctx_info = (struct cper_arm_ctx_info )(err_info + err->err_info_num); 72 ctx_err = (u8 )ctx_info; 73 74 for (n = 0; n < err->context_info_num; n++) { 75 sz = sizeof(struct cper_arm_ctx_info) + ctx_info->size; 76 ctx_info = (struct cper_arm_ctx_info )((long)ctx_info + sz); 77 ctx_len += sz; 78 } 79

and similar ones while trying to access section_length on an error dump with too small size.

[ rjw: Subject tweaks ]

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 242c652849d979d0133c315a42d9acea0ff88390 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 136093ba4161e0080088abff48273f6830a47766 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to db103b8bd3a4aca69b1b5fe8831a6ed75ac4b3bd (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 87880af2d24e62a84ed19943dbdd524f097172f2 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • unaffected from 6.12.75 to 6.12.* (incl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References