CVE-2026-43483: KVM SVM Performance Bug in Linux Kernel

Plataforma

linux

Componente

linux

Corregido en

ba3bca40f9f25c053f69413e5f4a41dd0fd762bf

Traduciendo a tu idioma…

CVE-2026-43483 addresses a performance-related issue within the Linux Kernel's Kernel-based Virtual Machine (KVM) module, specifically concerning the Second Level Address Translation (SLAT) feature (SVM). This vulnerability arises from a failure to properly clear CR8 write interception when Advanced Vector Extensions (AVIC) are deactivated. While not a direct security exploit on its own, the persistent interception can lead to significant performance degradation, especially when combined with other KVM bugs.

Impacto y Escenarios de Ataquetraduciendo…

The primary impact of CVE-2026-43483 is a performance degradation within virtual machines running on affected systems. The lingering CR8 write interception prevents efficient memory access, leading to slower VM execution and increased resource consumption. While this vulnerability doesn't directly allow for arbitrary code execution or data breaches, the performance impact can be substantial, particularly in environments with high VM density or resource-intensive workloads. The description explicitly mentions a connection to a separate bug (TPR sync) which, when combined, could exacerbate the performance issues. This could lead to denial-of-service conditions within the virtual machines themselves, effectively rendering them unusable.

Contexto de Explotacióntraduciendo…

CVE-2026-43483 is not currently listed on KEV or EPSS. The CVSS score is pending evaluation. No public proof-of-concept exploits are currently known. The vulnerability was published on 2026-05-13, suggesting it was recently discovered and addressed. Given the performance-oriented nature of the vulnerability, active exploitation is considered unlikely, but ongoing monitoring is advised.

Inteligencia de Amenazas

Estado del Exploit

Prueba de ConceptoDesconocido
CISA KEVNO

EPSS

0.02% (7% percentil)

Software Afectado

Componentelinux
ProveedorLinux
Versión máximaba3bca40f9f25c053f69413e5f4a41dd0fd762bf
Corregido enba3bca40f9f25c053f69413e5f4a41dd0fd762bf

Cronología

  1. Reservado
  2. Publicada
  3. EPSS actualizado

Mitigación y Workaroundstraduciendo…

The recommended mitigation for CVE-2026-43483 is to upgrade the Linux Kernel to version ba3bca40f9f25c053f69413e5f4a41dd0fd762bf or later. If a direct upgrade is not feasible due to compatibility constraints, consider rolling back to a previous stable kernel version that does not contain this vulnerability. There are no known WAF or proxy-based mitigations for this specific kernel vulnerability. Monitor VM performance closely; sustained performance degradation could indicate exploitation of this or related issues.

Cómo corregirlotraduciendo…

Actualizar el kernel de Linux a la versión 6.6.1 o posterior para corregir la vulnerabilidad. Esta actualización aborda un problema donde la interceptación de escritura de CR8 no se restablecía correctamente después de la desactivación de AVIC, lo que podía provocar problemas de rendimiento y, en combinación con otros errores, ser fatal para los invitados de Windows.

Preguntas frecuentestraduciendo…

What is CVE-2026-43483 — KVM SVM Performance Bug in Linux Kernel?

CVE-2026-43483 is a Linux Kernel vulnerability affecting the KVM SVM module. It causes a performance degradation due to a lingering CR8 write interception after AVIC deactivation, impacting virtual machine performance.

Am I affected by CVE-2026-43483 in Linux Kernel?

You are affected if your Linux Kernel version is less than or equal to ba3bca40f9f25c053f69413e5f4a41dd0fd762bf. Check your kernel version using 'uname -r'.

How do I fix CVE-2026-43483 in Linux Kernel?

Upgrade your Linux Kernel to version ba3bca40f9f25c053f69413e5f4a41dd0fd762bf or later. If upgrading is not possible, consider rolling back to a previous stable kernel.

Is CVE-2026-43483 being actively exploited?

Currently, there are no known public exploits or active campaigns targeting CVE-2026-43483. However, continuous monitoring is recommended.

Where can I find the official Linux advisory for CVE-2026-43483?

Refer to the Linux Kernel security announcements for details: https://lore.kernel.org/all/?q=CVE-2026-43483

¿Tu proyecto está afectado?

Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.

liveescaneo gratuito

Pruébalo ahora — sin cuenta

Sube cualquier manifiesto (composer.lock, package-lock.json, lista de plugins WordPress…) o pega tu lista de componentes. Recibís un reporte de vulnerabilidades al instante. Subir un archivo es solo el primer paso: con una cuenta tenés monitoreo continuo, alertas en tu canal, multi-proyecto y reportes white-label.

Escaneo manualAlertas en Slack/emailMonitoreo continuoReportes white-label

Arrastra y suelta tu archivo de dependencias

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...