Description
In the Linux kernel, the following vulnerability has been resolved:

pstore: ram_core: fix incorrect success return when vmap() fails

In persistent_ram_vmap(), vmap() may return NULL on failure.

If offset is non-zero, adding offset_in_page(start) causes the function
to return a non-NULL pointer even though the mapping failed.
persistent_ram_buffer_map() therefore incorrectly returns success.

Subsequent access to prz->buffer may dereference an invalid address
and cause crashes.

Add proper NULL checking for vmap() failures.
Published: 2026-05-06
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s persistent storage subsystem pstore uses a ram_core module that maps persistent memory into kernel address space. The fix corrects an error in persistent_ram_vmap where vmap can return NULL on failure. When a non‑zero offset is applied, an incorrect calculation can make the routine believe a mapping succeeded, resulting in a non‑NULL pointer that is actually invalid. The following call, persistent_ram_buffer_map, then returns success and later dereferences this bad address, causing a kernel fault and a crash. This results in a denial of service because the system cannot continue running. The flaw is an incorrect success calculation (CWE‑253).

Affected Systems

All Linux distributions that ship a kernel containing the vulnerable pstore ram_core implementation are affected. The issue exists in any kernel version prior to the inclusion of the recent patch. Users running older or custom kernels that have not been patched or hardened should consider their systems vulnerable. No specific vendor or product is singled out outside the generic Linux kernel, so the impact is broad across all Linux‑based operating systems.

Risk and Exploitability

The vulnerability is exploitable by code that can cause the pstore subsystem to attempt a mapping with a non‑zero offset and trigger vmap failure. The details of the attack vector are not explicitly stated in the CVE description and are inferred from the function behavior. Because the erroneous success check leads to a null pointer being treated as valid, subsequent dereference will fault. The attack requires local privileged execution and the ability to interact with the pstore code, so it is not widely available over the network. The CVSS score of 7.0 indicates high severity. With no EPSS score and no listing in the CISA KEV catalog, the likelihood of observed exploitation is low, but the high local impact and the potential for service disruption warrant immediate attention.

Generated by OpenCVE AI on May 7, 2026 at 07:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to a version that includes the pstore ram_core fix
  • Reboot the system to activate the updated kernel
  • Disable the pstore feature (e.g., setpstore disabled in kernel config or boot parameters) if an upgrade cannot be applied immediately
  • Monitor system logs for kernel panics and schedule timely kernel updates

Generated by OpenCVE AI on May 7, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 06:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-390

Thu, 07 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-253
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 06 May 2026 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-390

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: pstore: ram_core: fix incorrect success return when vmap() fails In persistent_ram_vmap(), vmap() may return NULL on failure. If offset is non-zero, adding offset_in_page(start) causes the function to return a non-NULL pointer even though the mapping failed. persistent_ram_buffer_map() therefore incorrectly returns success. Subsequent access to prz->buffer may dereference an invalid address and cause crashes. Add proper NULL checking for vmap() failures.
Title pstore: ram_core: fix incorrect success return when vmap() fails
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:10.221Z

Reserved: 2026-05-01T14:12:55.987Z

Link: CVE-2026-43124

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:29.313

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43124

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43124 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T07:30:24Z

Weaknesses