CVE-2026-43129
Description
In the Linux kernel, the following vulnerability has been resolved:
ima: verify the previous kernel's IMA buffer lies in addressable RAM
Patch series "Address page fault in ima_restore_measurement_list()", v3.
When the second-stage kernel is booted via kexec with a limiting command line such as "mem=" we observe a pafe fault that happens.
BUG: unable to handle page fault for address: ffff97793ff47000 RIP: ima_restore_measurement_list+0xdc/0x45a #PF: error_code(0x0000) not-present page
This happens on x86_64 only, as this is already fixed in aarch64 in commit: cbf9c4b9617b ("of: check previous kernel's ima-kexec-buffer against memory bounds")
This patch (of 3):
When the second-stage kernel is booted with a limiting command line (e.g. "mem="), the IMA measurement buffer handed over from the previous kernel may fall outside the addressable RAM of the new kernel. Accessing such a buffer can fault during early restore.
Introduce a small generic helper, ima_validate_range(), which verifies that a physical [start, end] range for the previous-kernel IMA buffer lies within addressable memory: - On x86, use pfn_range_is_mapped(). - On OF based architectures, use page_is_ram().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, the IMA measurement buffer from a previous kernel may not be in addressable RAM during kexec with memory limits, causing a page fault; fixed by adding a range validation check.
Vulnerability
CVE-2026-43129 is a vulnerability in the Linux kernel's Integrity Measurement Architecture (IMA) subsystem. When a second-stage kernel is booted via kexec with a limiting command line (e.g., mem=), the IMA measurement buffer handed over from the previous kernel may reside outside the new kernel's addressable RAM. Accessing such a buffer during early restore triggers a page fault, as observed in the bug report.
Exploitation
An attacker with the ability to control the kexec boot command line (e.g., by adjusting mem=) could potentially trigger this page fault. The vulnerability is exploitable only on x86_64 systems; it was already fixed on aarch64 by commit cbf9c4b9617b [1]. Exploitation requires physical access or privileged control over the kernel boot parameters, and the system must be configured for kexec.
Impact
Successful exploitation results in a kernel page fault, likely causing a system crash (denial of service). The crash occurs during early boot of the second kernel, preventing the system from starting. No privilege escalation or data integrity impact is described.
Mitigation
The fix introduces a generic helper, ima_validate_range(), which verifies that the physical address range of the previous-kernel IMA buffer lies within addressable memory. On x86, it uses pfn_range_is_mapped(); on OF-based architectures, it uses page_is_ram() [2][3][4]. The patch series has been applied to the Linux kernel stable branches. Users should update to a patched kernel version.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
1- Patch Tuesday - May 2026Rapid7 Blog · May 13, 2026