CVE-2026-43482: Kernel Preemption Issue in Linux Kernel
Plataforma
linux
Componente
linux
Corrigido em
41423912f7ac7494ccd6eef411227b4efce740e0
CVE-2026-43482 addresses a preemption vulnerability within the Linux kernel's sched_ext component. This flaw arises when a task is preempted between claiming exit and kicking helper work, potentially preventing proper error handling and bypass mode activation. The vulnerability impacts Linux kernel versions up to and including 41423912f7ac7494ccd6eef411227b4efce740e0, and a fix is available in version 41423912f7ac7494ccd6eef411227b4efce740e0.
Impacto e Cenários de Ataquetraduzindo…
The core of the vulnerability lies in the schedext scheduler's handling of exit procedures. Specifically, the scxclaim_exit() function atomically sets an exit kind to prevent further error handling. Following this, a helper kthread work is intended to be kicked, initiating bypass mode and teardown. However, if the calling task is preempted before this helper work is kicked, and the BPF scheduler fails to reschedule it, the helper work is never queued. This leaves the system in a state where bypass mode isn't activated, and critical error handling is suppressed. While the precise impact is still being evaluated, this scenario could lead to system instability, unexpected behavior, or potentially denial-of-service conditions, particularly in environments heavily reliant on BPF scheduling. The lack of proper error handling could also mask underlying issues, making debugging more difficult.
Contexto de Exploraçãotraduzindo…
CVE-2026-43482 was published on 2026-05-13. Its exploitation probability is currently pending evaluation. There are no publicly known proof-of-concept (POC) exploits available at this time. The vulnerability does not appear on the KEV catalog or have an EPSS score assigned. Given the nature of the vulnerability – a potential race condition within the kernel scheduler – it's plausible that attackers could develop exploits, particularly if they have deep knowledge of the BPF scheduler and kernel internals.
Software Afetado
Linha do tempo
- Reservado
- Publicada
Mitigação e Soluções Alternativastraduzindo…
The primary mitigation for CVE-2026-43482 is to upgrade to the fixed Linux kernel version 41423912f7ac7494ccd6eef411227b4efce740e0. Before upgrading, it's crucial to review the kernel changelog for any potential compatibility issues with existing drivers or applications. If a direct upgrade is not feasible due to compatibility concerns, consider applying relevant patches or backporting the fix to an older, supported kernel version, though this requires careful testing. There are no known WAF or proxy rules that can directly mitigate this kernel-level vulnerability. Monitoring system logs for unusual scheduler behavior or errors related to BPF scheduling could provide early indicators of potential exploitation, but this is not a preventative measure. After upgrading, confirm the fix by examining the kernel version (uname -r) and verifying that the sched_ext component is functioning as expected under load.
Como corrigirtraduzindo…
Aplicar la actualización del kernel a la versión 6.12.1 o superior. Esta actualización corrige una condición de carrera que puede provocar un bloqueo del sistema. Se recomienda actualizar el sistema lo antes posible para mitigar el riesgo.
Perguntas frequentestraduzindo…
What is CVE-2026-43482 — Kernel Preemption Issue in Linux Kernel?
CVE-2026-43482 is a vulnerability in the Linux kernel where a preemption issue in the sched_ext component can prevent proper error handling and bypass mode activation, potentially leading to system instability.
Am I affected by CVE-2026-43482 in Linux Kernel?
You are affected if your system is running a Linux kernel version less than or equal to 41423912f7ac7494ccd6eef411227b4efce740e0. Check your kernel version using uname -r.
How do I fix CVE-2026-43482 in Linux Kernel?
Upgrade your Linux kernel to version 41423912f7ac7494ccd6eef411227b4efce740e0. Review the changelog for compatibility before upgrading.
Is CVE-2026-43482 being actively exploited?
There are currently no publicly known exploits or active campaigns targeting CVE-2026-43482, but exploitation is possible given the nature of the vulnerability.
Where can I find the official Linux advisory for CVE-2026-43482?
Refer to the official Linux kernel security announcements and the relevant mailing lists for updates and advisories regarding CVE-2026-43482.
Seu projeto está afetado?
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Experimente agora — sem conta
Suba qualquer manifesto (composer.lock, package-lock.json, lista de plugins WordPress…) ou cole sua lista de componentes. Você receberá um relatório de vulnerabilidades instantaneamente. Subir um arquivo é apenas o começo: com uma conta você terá monitoramento contínuo, alertas por Slack/email, vários projetos e relatórios com marca branca.
Arraste e solte seu arquivo de dependências
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...