Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-43125

In the Linux kernel, the following vulnerability has been resolved: dlm: validate length in dlm_search_rsb_tree The len parameter in dlm_dump_rsb_name() is not validated and comes from network messages. When it exceeds DLM_RESNAME_MAXLEN, it can cause out-of-bounds write in dlm_search_rsb_tree(). Add length validation to prevent potential buffer overflow.

View on NVD

Analysis

A critical vulnerability has been identified in the Linux kernel Distributed Lock Manager (DLM). This flaw allows an unauthenticated attacker to trigger an out-of-bounds write via network messages, potentially leading to remote code execution at the kernel level on affected systems.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-787

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 4.7%
EPSS: 2026-05-08

Affects

linux:linux_kernel

Technical description

In the Linux kernel, the following vulnerability has been resolved: dlm: validate length in dlm_search_rsb_tree The len parameter in dlm_dump_rsb_name() is not validated and comes from network messages. When it exceeds DLM_RESNAME_MAXLEN, it can cause out-of-bounds write in dlm_search_rsb_tree(). Add length validation to prevent potential buffer overflow.

Published: 5/6/2026, 12:16:29 PM
Last modified: 5/8/2026, 5:57:31 PM

References

HomeEventsBlogResourcesTeam