Improper input validation in Linux kernel - CVE-2026-43212
Published: May 7, 2026
Vulnerability identifier: #VU130526
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-43212
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in cpumask_of_node() when handling a NUMA_NO_NODE index. A local user can trigger the vulnerable code path to cause a denial of service.
The issue affects the LoongArch architecture-specific implementation.
Remediation
Install security update from vendor's repository.
External links
- https://git.kernel.org/stable/c/1d8f2f024801019d85159a020b72a4424b46bcf4
- https://git.kernel.org/stable/c/61a56df2fbaad3a4d00f0c6a904b5d1ee8982eb4
- https://git.kernel.org/stable/c/92adfb707beec0fe956424373654a70aad35ea13
- https://git.kernel.org/stable/c/94b0c831eda778ae9e4f2164a8b3de485d8977bb
- https://git.kernel.org/stable/c/b5bf05e05cdf489a04137e4da407de9d4cca5295
- https://git.kernel.org/stable/c/bb1a54f7f011f19ed936632698eae574e0b91063