CVE-2026-43261
Description
In the Linux kernel, the following vulnerability has been resolved:
arm64: Add support for TSV110 Spectre-BHB mitigation
The TSV110 processor is vulnerable to the Spectre-BHB (Branch History Buffer) attack, which can be exploited to leak information through branch prediction side channels. This commit adds the MIDR of TSV110 to the list for software mitigation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel adds Spectre-BHB software mitigation for TSV110 ARM processor vulnerable to branch prediction side-channel attacks.
Vulnerability
CVE-2026-43261 addresses a Spectre-BHB (Branch History Buffer) vulnerability in the TSV110 ARM processor. Spectre-BHB is a side-channel attack that allows an attacker to infer sensitive information by manipulating the branch history buffer and observing subsequent branch prediction behavior. The TSV110 CPU is susceptible to this attack, potentially leaking data across security boundaries.
Exploitation
An attacker with local access or the ability to execute arbitrary code on a system using the TSV110 processor can exploit this vulnerability. The attack typically requires knowledge of the processor's branch predictor implementation and the ability to run code in the same CPU context, such as from an unprivileged process or within a container. No authentication is needed beyond the ability to execute code [1].
Impact
Successful exploitation could result in information disclosure, allowing an attacker to read sensitive data from the kernel or other processes. This may include cryptographic keys, passwords, or other confidential information, potentially leading to further compromise of the system.
Mitigation
The Linux kernel commit adds the TSV110 processor's MIDR (Main ID Register) to the list of CPUs that require a software-based Spectre-BHB mitigation. This ensures that the kernel applies the appropriate workaround (such as clearing the branch history buffer) on affected systems. System administrators should update their kernels to include this fix [1]. No hardware changes are required.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/598c11dd4f4a9de31d854fcb9702f54c1c70f0d0nvdPatch
- git.kernel.org/stable/c/5dbe1f14359735fa50ba0dd4a496125b5bc7f422nvdPatch
- git.kernel.org/stable/c/a8d0ad5d990b050a6db74218a34b5529085e16b8nvdPatch
- git.kernel.org/stable/c/ad0c356cae164ed5dbd1f4cfd438e46faa5292cbnvdPatch
- git.kernel.org/stable/c/cccf96c49f61e47d9332d6a4d1c7fe9a2df44440nvdPatch
- git.kernel.org/stable/c/e3baa5d4b361276efeb87b20d8beced451a7dbd5nvdPatch
- git.kernel.org/stable/c/fd51d47fcacec3ca027eb65d8c44853d3b6cea95nvdPatch
- git.kernel.org/stable/c/fd7e360845d331f542854d552469544182e61134nvdPatch
News mentions
0No linked articles in our index yet.