VYPR
Medium severity5.5NVD Advisory· Published May 6, 2026· Updated May 8, 2026

CVE-2026-43261

CVE-2026-43261

Description

In the Linux kernel, the following vulnerability has been resolved:

arm64: Add support for TSV110 Spectre-BHB mitigation

The TSV110 processor is vulnerable to the Spectre-BHB (Branch History Buffer) attack, which can be exploited to leak information through branch prediction side channels. This commit adds the MIDR of TSV110 to the list for software mitigation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel adds Spectre-BHB software mitigation for TSV110 ARM processor vulnerable to branch prediction side-channel attacks.

Vulnerability

CVE-2026-43261 addresses a Spectre-BHB (Branch History Buffer) vulnerability in the TSV110 ARM processor. Spectre-BHB is a side-channel attack that allows an attacker to infer sensitive information by manipulating the branch history buffer and observing subsequent branch prediction behavior. The TSV110 CPU is susceptible to this attack, potentially leaking data across security boundaries.

Exploitation

An attacker with local access or the ability to execute arbitrary code on a system using the TSV110 processor can exploit this vulnerability. The attack typically requires knowledge of the processor's branch predictor implementation and the ability to run code in the same CPU context, such as from an unprivileged process or within a container. No authentication is needed beyond the ability to execute code [1].

Impact

Successful exploitation could result in information disclosure, allowing an attacker to read sensitive data from the kernel or other processes. This may include cryptographic keys, passwords, or other confidential information, potentially leading to further compromise of the system.

Mitigation

The Linux kernel commit adds the TSV110 processor's MIDR (Main ID Register) to the list of CPUs that require a software-based Spectre-BHB mitigation. This ensures that the kernel applies the appropriate workaround (such as clearing the branch history buffer) on affected systems. System administrators should update their kernels to include this fix [1]. No hardware changes are required.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.