Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43240
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:28
Updated At-11 May, 2026 | 22:20
Rejected At-
▼CVE Numbering Authority (CNA)
x86/kexec: add a sanity check on previous kernel's ima kexec buffer

In the Linux kernel, the following vulnerability has been resolved: x86/kexec: add a sanity check on previous kernel's ima kexec buffer When the second-stage kernel is booted via kexec with a limiting command line such as "mem=<size>", the physical range that contains the carried over IMA measurement list may fall outside the truncated RAM leading to a kernel panic. BUG: unable to handle page fault for address: ffff97793ff47000 RIP: ima_restore_measurement_list+0xdc/0x45a #PF: error_code(0x0000) – not-present page Other architectures already validate the range with page_is_ram(), as done in commit cbf9c4b9617b ("of: check previous kernel's ima-kexec-buffer against memory bounds") do a similar check on x86. Without carrying the measurement list across kexec, the attestation would fail.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/kernel/setup.c
Default Status
unaffected
Versions
Affected
  • From b69a2afd5afce9bf6d56e349d6ab592c916e20f2 before 37f18915a261afe84dab462624ed829cddb77a9b (git)
  • From b69a2afd5afce9bf6d56e349d6ab592c916e20f2 before 22e460b6333a5f818b042ac89201f8e735556f4a (git)
  • From b69a2afd5afce9bf6d56e349d6ab592c916e20f2 before f8f73bf0f8a57ee9b86792456bd42079bc98c6b7 (git)
  • From b69a2afd5afce9bf6d56e349d6ab592c916e20f2 before d4a132f121c591b60dbaf57ea91f1faf11631fbc (git)
  • From b69a2afd5afce9bf6d56e349d6ab592c916e20f2 before 4d7a8f5f28187e3d2958b2a134473da2665207e7 (git)
  • From b69a2afd5afce9bf6d56e349d6ab592c916e20f2 before c5489d04337b47e93c0623e8145fcba3f5739efd (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/kernel/setup.c
Default Status
affected
Versions
Affected
  • 6.0
Unaffected
  • From 0 before 6.0 (semver)
  • From 6.1.165 through 6.1.* (semver)
  • From 6.6.128 through 6.6.* (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/37f18915a261afe84dab462624ed829cddb77a9b
N/A
https://git.kernel.org/stable/c/22e460b6333a5f818b042ac89201f8e735556f4a
N/A
https://git.kernel.org/stable/c/f8f73bf0f8a57ee9b86792456bd42079bc98c6b7
N/A
https://git.kernel.org/stable/c/d4a132f121c591b60dbaf57ea91f1faf11631fbc
N/A
https://git.kernel.org/stable/c/4d7a8f5f28187e3d2958b2a134473da2665207e7
N/A
https://git.kernel.org/stable/c/c5489d04337b47e93c0623e8145fcba3f5739efd
N/A
Hyperlink: https://git.kernel.org/stable/c/37f18915a261afe84dab462624ed829cddb77a9b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/22e460b6333a5f818b042ac89201f8e735556f4a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f8f73bf0f8a57ee9b86792456bd42079bc98c6b7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d4a132f121c591b60dbaf57ea91f1faf11631fbc
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4d7a8f5f28187e3d2958b2a134473da2665207e7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c5489d04337b47e93c0623e8145fcba3f5739efd
Resource: N/A
Details not found