Out-of-Bounds Read in Linux Kernel Affecting CIFS Client
CVE-2026-43112
What is CVE-2026-43112?
A vulnerability in the Linux kernel's CIFS client allows for an out-of-bounds read when the cifs_sanitize_prepath function processes an empty string or a string filled with delimiters. This flaw can lead to unexpected behavior, as the logic checks an incorrect pointer prior to advancement, thus enabling a read from outside the allocated memory bounds. The issue was discovered through manual code audits and confirmed with a standalone test case utilizing AddressSanitizer, resulting in a segmentation fault for the affected inputs. An important patch was introduced to prevent this scenario by implementing an early exit check, ensuring that if no valid path content remains, the function terminates gracefully.
Affected Version(s)
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5d4fe469fe7dbff7d874c196bb680a82f2625d95
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2d29214448ec0f4e7e18bb1c14dd4a6c07f1c439
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 86f9c23e0814cfdffda9eedf0c591c51ba209010