Improper input validation in Linux kernel - CVE-2026-43291
Published: May 9, 2026
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in the nci packet data validation logic when processing variable-length packet data. A local user can provide a crafted packet with a variable length to cause a denial of service.
The issue occurs in cases where packet data is variable-length and cannot be safely compared against the maximum packet length derived from the structure size.
Remediation
External links
- https://git.kernel.org/stable/c/3b91160e9a91b5a2662875417dc42dc5b0bf03ea
- https://git.kernel.org/stable/c/498fc5d0d650c77e87fcc73808d4f43240c21805
- https://git.kernel.org/stable/c/571dcbeb8e635182bb825ae758399831805693c2
- https://git.kernel.org/stable/c/a24a8a582da4426b2042e510a1080df84083b51d
- https://git.kernel.org/stable/c/ad058a4317db7fdb3f09caa6ed536d24a62ce6a0
- https://git.kernel.org/stable/c/c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b
- https://git.kernel.org/stable/c/f5218426f765eee22e178df9c126d974792fb6a5