CVE-2026-43482: Kernel Preemption Issue in Linux Kernel
Plateforme
linux
Composant
linux
Corrigé dans
41423912f7ac7494ccd6eef411227b4efce740e0
CVE-2026-43482 addresses a preemption vulnerability within the Linux kernel's sched_ext component. This flaw arises when a task is preempted between claiming exit and kicking helper work, potentially preventing proper error handling and bypass mode activation. The vulnerability impacts Linux kernel versions up to and including 41423912f7ac7494ccd6eef411227b4efce740e0, and a fix is available in version 41423912f7ac7494ccd6eef411227b4efce740e0.
Impact et Scénarios d'Attaquetraduction en cours…
The core of the vulnerability lies in the schedext scheduler's handling of exit procedures. Specifically, the scxclaim_exit() function atomically sets an exit kind to prevent further error handling. Following this, a helper kthread work is intended to be kicked, initiating bypass mode and teardown. However, if the calling task is preempted before this helper work is kicked, and the BPF scheduler fails to reschedule it, the helper work is never queued. This leaves the system in a state where bypass mode isn't activated, and critical error handling is suppressed. While the precise impact is still being evaluated, this scenario could lead to system instability, unexpected behavior, or potentially denial-of-service conditions, particularly in environments heavily reliant on BPF scheduling. The lack of proper error handling could also mask underlying issues, making debugging more difficult.
Contexte d'Exploitationtraduction en cours…
CVE-2026-43482 was published on 2026-05-13. Its exploitation probability is currently pending evaluation. There are no publicly known proof-of-concept (POC) exploits available at this time. The vulnerability does not appear on the KEV catalog or have an EPSS score assigned. Given the nature of the vulnerability – a potential race condition within the kernel scheduler – it's plausible that attackers could develop exploits, particularly if they have deep knowledge of the BPF scheduler and kernel internals.
Logiciel Affecté
Chronologie
- Réservé
- Publiée
Mitigation et Contournementstraduction en cours…
The primary mitigation for CVE-2026-43482 is to upgrade to the fixed Linux kernel version 41423912f7ac7494ccd6eef411227b4efce740e0. Before upgrading, it's crucial to review the kernel changelog for any potential compatibility issues with existing drivers or applications. If a direct upgrade is not feasible due to compatibility concerns, consider applying relevant patches or backporting the fix to an older, supported kernel version, though this requires careful testing. There are no known WAF or proxy rules that can directly mitigate this kernel-level vulnerability. Monitoring system logs for unusual scheduler behavior or errors related to BPF scheduling could provide early indicators of potential exploitation, but this is not a preventative measure. After upgrading, confirm the fix by examining the kernel version (uname -r) and verifying that the sched_ext component is functioning as expected under load.
Comment corrigertraduction en cours…
Aplicar la actualización del kernel a la versión 6.12.1 o superior. Esta actualización corrige una condición de carrera que puede provocar un bloqueo del sistema. Se recomienda actualizar el sistema lo antes posible para mitigar el riesgo.
Questions fréquentestraduction en cours…
What is CVE-2026-43482 — Kernel Preemption Issue in Linux Kernel?
CVE-2026-43482 is a vulnerability in the Linux kernel where a preemption issue in the sched_ext component can prevent proper error handling and bypass mode activation, potentially leading to system instability.
Am I affected by CVE-2026-43482 in Linux Kernel?
You are affected if your system is running a Linux kernel version less than or equal to 41423912f7ac7494ccd6eef411227b4efce740e0. Check your kernel version using uname -r.
How do I fix CVE-2026-43482 in Linux Kernel?
Upgrade your Linux kernel to version 41423912f7ac7494ccd6eef411227b4efce740e0. Review the changelog for compatibility before upgrading.
Is CVE-2026-43482 being actively exploited?
There are currently no publicly known exploits or active campaigns targeting CVE-2026-43482, but exploitation is possible given the nature of the vulnerability.
Where can I find the official Linux advisory for CVE-2026-43482?
Refer to the official Linux kernel security announcements and the relevant mailing lists for updates and advisories regarding CVE-2026-43482.
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Essayez maintenant — sans compte
Téléchargez n'importe quel manifeste (composer.lock, package-lock.json, liste de plugins WordPress…) ou collez votre liste de composants. Vous obtiendrez un rapport de vulnérabilités instantanément. Le téléchargement d'un fichier n'est qu'un début : avec un compte vous bénéficiez d'une surveillance continue, d'alertes Slack/email, de multi-projets et de rapports en marque blanche.
Glissez-déposez votre fichier de dépendances
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...