CVE-2026-43129
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ima: verify the previous kernel&#39;s IMA buffer lies in addressable RAM<br />
<br />
Patch series "Address page fault in ima_restore_measurement_list()", v3.<br />
<br />
When the second-stage kernel is booted via kexec with a limiting command<br />
line such as "mem=" we observe a pafe fault that happens.<br />
<br />
BUG: unable to handle page fault for address: ffff97793ff47000<br />
RIP: ima_restore_measurement_list+0xdc/0x45a<br />
#PF: error_code(0x0000) not-present page<br />
<br />
This happens on x86_64 only, as this is already fixed in aarch64 in<br />
commit: cbf9c4b9617b ("of: check previous kernel&#39;s ima-kexec-buffer<br />
against memory bounds")<br />
<br />
<br />
This patch (of 3):<br />
<br />
When the second-stage kernel is booted with a limiting command line (e.g. <br />
"mem="), the IMA measurement buffer handed over from the previous<br />
kernel may fall outside the addressable RAM of the new kernel. Accessing<br />
such a buffer can fault during early restore.<br />
<br />
Introduce a small generic helper, ima_validate_range(), which verifies<br />
that a physical [start, end] range for the previous-kernel IMA buffer lies<br />
within addressable memory:<br />
- On x86, use pfn_range_is_mapped().<br />
- On OF based architectures, use page_is_ram().



