CVE-2026-43486: Kernel Contpte Fault in Linux Kernel
プラットフォーム
linux
コンポーネント
linux
修正版
97c5550b763171dbef61e6239cab372b9f9cd4a2
CVE-2026-43486 addresses a flaw within the Linux Kernel's contpte subsystem. This vulnerability stems from an incorrect check within the setaccessflags() function, potentially leading to incorrect handling of memory access permissions. The issue affects Linux Kernel versions prior to 97c5550b763171dbef61e6239cab372b9f9cd4a2, and a patch has been released to resolve it.
影響と攻撃シナリオ翻訳中…
The vulnerability lies in the contpteptepsetaccessflags() function, where a comparison against the gathered PTEP value could be misleading. Specifically, ptepget() ORs AF/dirty flags from all sub-PTEs, meaning a dirty sibling PTE could falsely indicate the target is already dirty. This can cause the function to return prematurely, even if the target sub-PTE still has PTERDONLY set in hardware. An attacker could potentially exploit this to bypass access controls and gain unauthorized access to memory regions. While the description mentions FEAT_HAFDBS, the core issue impacts systems regardless of this feature's presence, as the flawed logic remains. The potential impact includes privilege escalation and data breaches.
悪用の状況翻訳中…
The vulnerability was published on 2026-05-13. Its inclusion in the Linux Kernel indicates a significant security concern. As of this writing, there is no indication of this CVE being listed on KEV or having an EPSS score. Public proof-of-concept exploits are currently unknown, but the nature of the vulnerability suggests it could be targeted by advanced persistent threats (APTs) with kernel development expertise. Monitor security advisories and threat intelligence feeds for any signs of active exploitation.
影響を受けるソフトウェア
タイムライン
- 予約済み
- 公開日
緩和策と回避策翻訳中…
The primary mitigation for CVE-2026-43486 is to upgrade the Linux Kernel to version 97c5550b763171dbef61e6239cab372b9f9cd4a2 or later. Before upgrading, ensure compatibility with existing hardware and software. If a direct upgrade is not feasible due to compatibility issues, consider rolling back to a previous stable kernel version if possible, although this may introduce other vulnerabilities. There are no specific WAF or proxy rules applicable to this kernel-level vulnerability. Monitor kernel logs for any unusual memory access patterns after the upgrade.
修正方法翻訳中…
Aplicar la actualización del kernel a la versión 6.9 o superior. Esta actualización corrige un error en el manejo de las señales de fallo de la SMMU/ATS, evitando un posible bucle infinito de fallos en ciertas configuraciones de hardware.
よくある質問翻訳中…
What is CVE-2026-43486 — Kernel Contpte Fault in Linux Kernel?
CVE-2026-43486 is a vulnerability in the Linux Kernel's contpte subsystem where a faulty check in setaccessflags() can lead to incorrect memory access permissions, potentially allowing unauthorized access.
Am I affected by CVE-2026-43486 in Linux Kernel?
You are affected if your Linux Kernel version is prior to 97c5550b763171dbef61e6239cab372b9f9cd4a2. Check your kernel version using uname -r.
How do I fix CVE-2026-43486 in Linux Kernel?
Upgrade your Linux Kernel to version 97c5550b763171dbef61e6239cab372b9f9cd4a2 or later. Ensure compatibility before upgrading.
Is CVE-2026-43486 being actively exploited?
Currently, there are no known public exploits or active campaigns targeting CVE-2026-43486, but the vulnerability's nature suggests it could be a target for advanced attackers.
Where can I find the official Linux advisory for CVE-2026-43486?
Refer to the Linux Kernel security mailing list and relevant distribution security advisories for the official advisory regarding CVE-2026-43486.
今すぐ試す — アカウント不要
任意のマニフェスト(composer.lock、package-lock.json、WordPressプラグインリストなど)をアップロードするか、コンポーネントリストを貼り付けてください。脆弱性レポートを即座に入手できます。ファイルのアップロードはほんの始まりです。アカウントがあれば、継続的なモニタリング、Slack/メールアラート、マルチプロジェクト、ホワイトラベルレポートが使用できます。
依存関係ファイルをドラッグ&ドロップ
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...