CVE-2026-43482: Kernel Preemption Issue in Linux Kernel
平台
linux
组件
linux
修复版本
41423912f7ac7494ccd6eef411227b4efce740e0
CVE-2026-43482 addresses a preemption vulnerability within the Linux kernel's sched_ext component. This flaw arises when a task is preempted between claiming exit and kicking helper work, potentially preventing proper error handling and bypass mode activation. The vulnerability impacts Linux kernel versions up to and including 41423912f7ac7494ccd6eef411227b4efce740e0, and a fix is available in version 41423912f7ac7494ccd6eef411227b4efce740e0.
影响与攻击场景翻译中…
The core of the vulnerability lies in the schedext scheduler's handling of exit procedures. Specifically, the scxclaim_exit() function atomically sets an exit kind to prevent further error handling. Following this, a helper kthread work is intended to be kicked, initiating bypass mode and teardown. However, if the calling task is preempted before this helper work is kicked, and the BPF scheduler fails to reschedule it, the helper work is never queued. This leaves the system in a state where bypass mode isn't activated, and critical error handling is suppressed. While the precise impact is still being evaluated, this scenario could lead to system instability, unexpected behavior, or potentially denial-of-service conditions, particularly in environments heavily reliant on BPF scheduling. The lack of proper error handling could also mask underlying issues, making debugging more difficult.
利用背景翻译中…
CVE-2026-43482 was published on 2026-05-13. Its exploitation probability is currently pending evaluation. There are no publicly known proof-of-concept (POC) exploits available at this time. The vulnerability does not appear on the KEV catalog or have an EPSS score assigned. Given the nature of the vulnerability – a potential race condition within the kernel scheduler – it's plausible that attackers could develop exploits, particularly if they have deep knowledge of the BPF scheduler and kernel internals.
受影响的软件
时间线
- 已保留
- 发布日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2026-43482 is to upgrade to the fixed Linux kernel version 41423912f7ac7494ccd6eef411227b4efce740e0. Before upgrading, it's crucial to review the kernel changelog for any potential compatibility issues with existing drivers or applications. If a direct upgrade is not feasible due to compatibility concerns, consider applying relevant patches or backporting the fix to an older, supported kernel version, though this requires careful testing. There are no known WAF or proxy rules that can directly mitigate this kernel-level vulnerability. Monitoring system logs for unusual scheduler behavior or errors related to BPF scheduling could provide early indicators of potential exploitation, but this is not a preventative measure. After upgrading, confirm the fix by examining the kernel version (uname -r) and verifying that the sched_ext component is functioning as expected under load.
修复方法翻译中…
Aplicar la actualización del kernel a la versión 6.12.1 o superior. Esta actualización corrige una condición de carrera que puede provocar un bloqueo del sistema. Se recomienda actualizar el sistema lo antes posible para mitigar el riesgo.
常见问题翻译中…
What is CVE-2026-43482 — Kernel Preemption Issue in Linux Kernel?
CVE-2026-43482 is a vulnerability in the Linux kernel where a preemption issue in the sched_ext component can prevent proper error handling and bypass mode activation, potentially leading to system instability.
Am I affected by CVE-2026-43482 in Linux Kernel?
You are affected if your system is running a Linux kernel version less than or equal to 41423912f7ac7494ccd6eef411227b4efce740e0. Check your kernel version using uname -r.
How do I fix CVE-2026-43482 in Linux Kernel?
Upgrade your Linux kernel to version 41423912f7ac7494ccd6eef411227b4efce740e0. Review the changelog for compatibility before upgrading.
Is CVE-2026-43482 being actively exploited?
There are currently no publicly known exploits or active campaigns targeting CVE-2026-43482, but exploitation is possible given the nature of the vulnerability.
Where can I find the official Linux advisory for CVE-2026-43482?
Refer to the official Linux kernel security announcements and the relevant mailing lists for updates and advisories regarding CVE-2026-43482.
立即试用 — 无需账户
上传任意清单文件(composer.lock、package-lock.json、WordPress插件列表等)或粘贴组件列表,即可立即获得漏洞报告。上传文件只是开始:注册账号后,您将获得持续监控、Slack/邮件提醒、多项目管理和白标报告等功能。
拖放您的依赖文件
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...