Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43347
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 May, 2026 | 13:39
Updated At-11 May, 2026 | 22:22
Rejected At-
▼CVE Numbering Authority (CNA)
arm64: dts: qcom: monaco: Reserve full Gunyah metadata region

In the Linux kernel, the following vulnerability has been resolved: arm64: dts: qcom: monaco: Reserve full Gunyah metadata region We observe spurious "Synchronous External Abort" exceptions (ESR=0x96000010) and kernel crashes on Monaco-based platforms. These faults are caused by the kernel inadvertently accessing hypervisor-owned memory that is not properly marked as reserved. >From boot log, The Qualcomm hypervisor reports the memory range at 0x91a80000 of size 0x80000 (512 KiB) as hypervisor-owned: qhee_hyp_assign_remove_memory: 0x91a80000/0x80000 -> ret 0 However, the EFI memory map provided by firmware only reserves the subrange 0x91a40000–0x91a87fff (288 KiB). The remaining portion (0x91a88000–0x91afffff) is incorrectly reported as conventional memory (from efi debug): efi: 0x000091a40000-0x000091a87fff [Reserved...] efi: 0x000091a88000-0x0000938fffff [Conventional...] As a result, the allocator may hand out PFNs inside the hypervisor owned region, causing fatal aborts when the kernel accesses those addresses. Add a reserved-memory carveout for the Gunyah hypervisor metadata at 0x91a80000 (512 KiB) and mark it as no-map so Linux does not map or allocate from this area. For the record: Hyp version: gunyah-e78adb36e debug (2025-11-17 05:38:05 UTC) UEFI Ver: 6.0.260122.BOOT.MXF.1.0.c1-00449-KODIAKLA-1

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/arm64/boot/dts/qcom/monaco.dtsi
Default Status
unaffected
Versions
Affected
  • From 7be190e4bdd2bd1aca84afef06bb755c06a85473 before edde62571f7602d83243ca51729ce42d22ea04d2 (git)
  • From 7be190e4bdd2bd1aca84afef06bb755c06a85473 before 59bd9088336d2bb7e713dcf4df5cbda86bb3c611 (git)
  • From 7be190e4bdd2bd1aca84afef06bb755c06a85473 before 85d98669fa7f1d3041d962515e45ee6e392db6f8 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/arm64/boot/dts/qcom/monaco.dtsi
Default Status
affected
Versions
Affected
  • 6.14
Unaffected
  • From 0 before 6.14 (semver)
  • From 6.18.24 through 6.18.* (semver)
  • From 6.19.14 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/edde62571f7602d83243ca51729ce42d22ea04d2
N/A
https://git.kernel.org/stable/c/59bd9088336d2bb7e713dcf4df5cbda86bb3c611
N/A
https://git.kernel.org/stable/c/85d98669fa7f1d3041d962515e45ee6e392db6f8
N/A
Hyperlink: https://git.kernel.org/stable/c/edde62571f7602d83243ca51729ce42d22ea04d2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/59bd9088336d2bb7e713dcf4df5cbda86bb3c611
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/85d98669fa7f1d3041d962515e45ee6e392db6f8
Resource: N/A
Details not found