{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43124","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:55.987Z","datePublished":"2026-05-06T11:27:10.221Z","dateUpdated":"2026-05-11T22:18:13.233Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:18:13.233Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npstore: ram_core: fix incorrect success return when vmap() fails\n\nIn persistent_ram_vmap(), vmap() may return NULL on failure.\n\nIf offset is non-zero, adding offset_in_page(start) causes the function\nto return a non-NULL pointer even though the mapping failed.\npersistent_ram_buffer_map() therefore incorrectly returns success.\n\nSubsequent access to prz->buffer may dereference an invalid address\nand cause crashes.\n\nAdd proper NULL checking for vmap() failures."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/pstore/ram_core.c"],"versions":[{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"d47234840aeb4182ed3ee795c578b1dfa9cbd25b","status":"affected","versionType":"git"},{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"49918dd52615097529811d21ec6074dd02ebe77c","status":"affected","versionType":"git"},{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"8baa234181f632cabacf73e4834a910859e9fcc9","status":"affected","versionType":"git"},{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"1da904e84de608907662ad8a51ba9c571d61e003","status":"affected","versionType":"git"},{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"8d849adfbc3e98417fb541620568db1a759ef441","status":"affected","versionType":"git"},{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"2c99326dc1c79b7ce3c8dd92929b5ce724ff70eb","status":"affected","versionType":"git"},{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"88d5b28f63c7aac1271784e3b800ed405d1cde75","status":"affected","versionType":"git"},{"version":"831b624df1b420c8f9281ed1307a8db23afb72df","lessThan":"05363abc7625cf18c96e67f50673cd07f11da5e9","status":"affected","versionType":"git"},{"version":"9095f19baae92afb978f8df77d19280fe291b337","status":"affected","versionType":"git"},{"version":"36a9916189b46b78dbf4fa542739b464444f0537","status":"affected","versionType":"git"},{"version":"1cd01dba1355e291f636555b1920625ed58c1623","status":"affected","versionType":"git"},{"version":"7026e2457c5b0c0e8a81e65a8209b8420a437b4d","status":"affected","versionType":"git"},{"version":"1e5b387747ba285a64348b9a96b246d0b9d52b03","status":"affected","versionType":"git"},{"version":"d0028f48b33086cf6d8f87831a650866107b5785","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/pstore/ram_core.c"],"versions":[{"version":"4.19","status":"affected"},{"version":"0","lessThan":"4.19","status":"unaffected","versionType":"semver"},{"version":"5.10.252","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.202","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.165","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.128","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.75","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.16","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.6","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.10.252"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.15.202"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.1.165"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.6.128"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.12.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.18.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.19.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"7.0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.16.62"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18.123"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.158"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.129"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.72"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d47234840aeb4182ed3ee795c578b1dfa9cbd25b"},{"url":"https://git.kernel.org/stable/c/49918dd52615097529811d21ec6074dd02ebe77c"},{"url":"https://git.kernel.org/stable/c/8baa234181f632cabacf73e4834a910859e9fcc9"},{"url":"https://git.kernel.org/stable/c/1da904e84de608907662ad8a51ba9c571d61e003"},{"url":"https://git.kernel.org/stable/c/8d849adfbc3e98417fb541620568db1a759ef441"},{"url":"https://git.kernel.org/stable/c/2c99326dc1c79b7ce3c8dd92929b5ce724ff70eb"},{"url":"https://git.kernel.org/stable/c/88d5b28f63c7aac1271784e3b800ed405d1cde75"},{"url":"https://git.kernel.org/stable/c/05363abc7625cf18c96e67f50673cd07f11da5e9"}],"title":"pstore: ram_core: fix incorrect success return when vmap() fails","x_generator":{"engine":"bippy-1.2.0"}}}}