Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

DEBIAN-CVE-2026-43197

In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, msg is not nul-terminated msg passed to netconsole from the console subsystem is not guaranteed to be...
Back to all
CVE

DEBIAN-CVE-2026-43197

In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, msg is not nul-terminated msg passed to netconsole from the console subsystem is not guaranteed to be...

In the Linux kernel, the following vulnerability has been resolved:  netconsole: avoid OOB reads, msg is not nul-terminated  msg passed to netconsole from the console subsystem is not guaranteed to be nul-terminated. Before recent commit 7eab73b18630 ("netconsole: convert to NBCON console infrastructure") the message would be placed in printksharedpbufs, a static global buffer, so KASAN had harder time catching OOB accesses. Now we see:      printk: console [netconext0] enabled     BUG: KASAN: slab-out-of-bounds in string+0x1f7/0x240     Read of size 1 at addr ffff88813b6d4c00 by task pr/netconext0/594      CPU: 65 UID: 0 PID: 594 Comm: pr/netconext0 Not tainted 6.19.0-11754-g4246fd6547c9     Call Trace:      kasanreport+0xe4/0x120      string+0x1f7/0x240      vsnprintf+0x655/0xba0      scnprintf+0xba/0x120      netconsolewrite+0x3fe/0xa10      nbconemitnextrecord+0x46e/0x860      nbconkthreadfunc+0x623/0x750      Allocated by task 1:      nbconalloc+0x1ea/0x450      registerconsole+0x26b/0xe10      init_netconsole+0xbb0/0xda0      The buggy address belongs to the object at ffff88813b6d4000                 which belongs to the cache kmalloc-4k of size 4096     The buggy address is located 0 bytes to the right of                 allocated 3072-byte region [ffff88813b6d4000, ffff88813b6d4c00)

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
-
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
C
H
U
-

Related Resources

No items found.

References

https://security-tracker.debian.org/tracker/CVE-2026-43197

Severity

9.1

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.1
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
0
Fix Available
6.19.6-1

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading