Description
In the Linux kernel, the following vulnerability has been resolved:

dm-verity: correctly handle dm_bufio_client_create() failure

If either of the calls to dm_bufio_client_create() in verity_fec_ctr()
fails, then dm_bufio_client_destroy() is later called with an ERR_PTR()
argument. That causes a crash. Fix this.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability originates in the Linux kernel's dm‑verity subsystem, where errors from dm_bufio_client_create() are not correctly handled. If either creation call fails, a subsequent call to dm_bufio_client_destroy() receives an ERR_PTR argument, triggering a crash. This fault leads to a denial of service by bringing the kernel down and disrupting system availability.

Affected Systems

All Linux kernel deployments that use the dm‑verity subsystem before the inclusion of the identified patch commit series. The fix applies to all supported kernel versions that incorporate the dm‑verity code path, as referenced by the provided git commit URLs.

Risk and Exploitability

The CVSS score is not provided, and EPSS data is unavailable, making it difficult to quantify the likelihood of exploitation. Nonetheless, the defect can be triggered by interacting with the dm‑verity monitoring mechanism, implying a local or privileged execution requirement. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation at the time of reporting.

Generated by OpenCVE AI on May 6, 2026 at 14:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that includes the patch commit "dm-verity: correctly handle dm_bufio_client_create() failure".
  • Reboot the system to ensure the updated kernel and dm-verity subsystem are loaded.
  • Disable dm‑verity for non-essential partitions or configure the system to alert on dm‑verity failures.

Generated by OpenCVE AI on May 6, 2026 at 14:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-235

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: dm-verity: correctly handle dm_bufio_client_create() failure If either of the calls to dm_bufio_client_create() in verity_fec_ctr() fails, then dm_bufio_client_destroy() is later called with an ERR_PTR() argument. That causes a crash. Fix this.
Title dm-verity: correctly handle dm_bufio_client_create() failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:20.213Z

Reserved: 2026-05-01T14:12:55.988Z

Link: CVE-2026-43132

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:30.357

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T15:00:07Z

Weaknesses