Linux kernel afs rxrpc: Missing error pointer check
CVE-2026-43463 Published on May 8, 2026
rxrpc, afs: Fix missing error pointer check after rxrpc_kernel_lookup_peer()
In the Linux kernel, the following vulnerability has been resolved:
rxrpc, afs: Fix missing error pointer check after rxrpc_kernel_lookup_peer()
rxrpc_kernel_lookup_peer() can also return error pointers in addition to
NULL, so just checking for NULL is not sufficient.
Fix this by:
(1) Changing rxrpc_kernel_lookup_peer() to return -ENOMEM rather than NULL
on allocation failure.
(2) Making the callers in afs use IS_ERR() and PTR_ERR() to pass on the
error code returned.
Products Associated with CVE-2026-43463
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 72904d7b9bfbf2dd146254edea93958bc35bbbfe and below d55fa7cd4b19ba91b34b307d769c149e56ad0a75 is affected.
- Version 72904d7b9bfbf2dd146254edea93958bc35bbbfe and below 54331c5dcc6d97683d7ca2788e7ef9c9505e1477 is affected.
- Version 72904d7b9bfbf2dd146254edea93958bc35bbbfe and below 4245a79003adf30e67f8e9060915bd05cb31d142 is affected.
- Version 056fc740be000d39a7dba700a935f3bbfbc664e6 is affected.
- Version 6.8 is affected.
- Before 6.8 is unaffected.
- Version 6.18.19, <= 6.18.* is unaffected.
- Version 6.19.9, <= 6.19.* is unaffected.
- Version 7.0, <= * is unaffected.