net: txgbe: leave space for null terminators on property_entry

Summary

CVECVE-2026-43082
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-06 10:16:21 UTC
Updated2026-05-06 13:08:07 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: net: txgbe: leave space for null terminators on property_entry Lists of struct property_entry are supposed to be terminated with an empty property, this driver currently seems to be allocating exactly the amount of entry used. Change the struct definition to leave an extra element for all property_entry.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected c3e382ad6d15a8041ab8a168ad3ff90137ee8a45 00e1d650fa4b228ef1faea8e29effe4b4861e6e4 git Not specified
CNA Linux Linux affected c3e382ad6d15a8041ab8a168ad3ff90137ee8a45 16eb3c2f86de9a21aefe7a6386607d4cd3947a77 git Not specified
CNA Linux Linux affected c3e382ad6d15a8041ab8a168ad3ff90137ee8a45 8eff73e58e1f8fe991522acb863164319a7f7dd3 git Not specified
CNA Linux Linux affected c3e382ad6d15a8041ab8a168ad3ff90137ee8a45 92c09262dac565a6b831fd724b81fe4ff76f51b4 git Not specified
CNA Linux Linux affected c3e382ad6d15a8041ab8a168ad3ff90137ee8a45 5a37d228799b0ec2c277459c83c814a59d310bc3 git Not specified
CNA Linux Linux affected 6.5 Not specified
CNA Linux Linux unaffected 6.5 semver Not specified
CNA Linux Linux unaffected 6.6.136 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.83 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.24 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.14 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/16eb3c2f86de9a21aefe7a6386607d4cd3947a77 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/00e1d650fa4b228ef1faea8e29effe4b4861e6e4 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/5a37d228799b0ec2c277459c83c814a59d310bc3 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/8eff73e58e1f8fe991522acb863164319a7f7dd3 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/92c09262dac565a6b831fd724b81fe4ff76f51b4 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report