Description
In the Linux kernel, the following vulnerability has been resolved:

perf/arm-cmn: Reject unsupported hardware configurations

So far we've been fairly lax about accepting both unknown CMN models
(at least with a warning), and unknown revisions of those which we
do know, as although things do frequently change between releases,
typically enough remains the same to be somewhat useful for at least
some basic bringup checks. However, we also make assumptions of the
maximum supported sizes and numbers of things in various places, and
there's no guarantee that something new might not be bigger and lead
to nasty array overflows. Make sure we only try to run on things that
actually match our assumptions and so will not risk memory corruption.

We have at least always failed on completely unknown node types, so
update that error message for clarity and consistency too.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Attacks targeting the Linux perf subsystem’s ARM Common Memory (CMN) path allow an attacker to supply hardware that does not match the kernel’s expectations. The legacy code assumed upper bounds on array sizes and numbers of features, and if a newer or larger CMN node is presented, a buffer overflow can occur in memory. This memory corruption could lead to loss of confidentiality, integrity, or availability of the kernel. The impact is limited to environments where the kernel parses device trees for CMN nodes, so the likely attack vector is local, as the fault manifests during boot or when the kernel queries hardware; the consequence is either denial of service through a kernel panic or potential local privilege escalation if the overflow is exploitable.

Affected Systems

Linux kernels that include the perf/arm-cmn module and have not yet applied the fix. All releases before the patch commit referenced in the kernel documentation are potential targets. Because the bug operates in early boot when the kernel parses device trees, any system that boots a kernel with that legacy code – regardless of distribution – is potentially exposed. Kernels on the ARM architecture that still ship older CMN handling logic should be updated.

Risk and Exploitability

The CVSS score is not provided and EPSS is unavailable, and the flaw is not listed in the CISA KEV catalog, indicating no publicly known exploitation campaigns. Nevertheless, the vulnerability can lead to kernel panic or privilege elevation, so it presents a moderate to high risk for environments where hardware configuration changes or unknown CMN nodes are possible. Exploitation requires local access or control over the hardware configuration presented to the kernel, and the likely attack vector is local manipulation of the device tree during boot or plug‑in events.

Generated by OpenCVE AI on May 6, 2026 at 14:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace the running kernel with a version that incorporates the hardened CMN checks from the patch.
  • If a newer kernel is not yet available, disable the perf subsystem or unbind the problematic CMN device to avoid triggering the vulnerable code.
  • Review system logs for messages indicating unsupported CMN nodes or failures during boot, and monitor for abnormal kernel activity.

Generated by OpenCVE AI on May 6, 2026 at 14:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: perf/arm-cmn: Reject unsupported hardware configurations So far we've been fairly lax about accepting both unknown CMN models (at least with a warning), and unknown revisions of those which we do know, as although things do frequently change between releases, typically enough remains the same to be somewhat useful for at least some basic bringup checks. However, we also make assumptions of the maximum supported sizes and numbers of things in various places, and there's no guarantee that something new might not be bigger and lead to nasty array overflows. Make sure we only try to run on things that actually match our assumptions and so will not risk memory corruption. We have at least always failed on completely unknown node types, so update that error message for clarity and consistency too.
Title perf/arm-cmn: Reject unsupported hardware configurations
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:32.359Z

Reserved: 2026-05-01T14:12:55.989Z

Link: CVE-2026-43150

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:32.690

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43150

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T15:00:07Z

Weaknesses