Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3452 articles · 142284 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-43289EXPLOITEDPATCHED
linux · linux kernel

kexec: derive purgatory entry from symbol

Description

A vulnerability was found in Linux Kernel up to 6.19.5 and classified as critical. The impacted element is the function kexec_load_purgatory of the file kernel/kexec_file.c. Such manipulation leads to privilege escalation. This vulnerability is uniquely identified as CVE-2026-43289. The attack can only be initiated within the local network. No exploit exists. It is suggested to upgrade the affected component.

Affected Products

VendorProductVersions
linuxlinux kernelf368aed4827bd4276c0e3664fb2cb815a8d7caf3, d38e051ec6fd8650b139d9bc4b0b8b261953b263, 013027918a4efa807409fcb356009c117e4d181a, 8652d44f466ad5772e7d1756e9457046189b0dfc, 8652d44f466ad5772e7d1756e9457046189b0dfc, 8652d44f466ad5772e7d1756e9457046189b0dfc, 8652d44f466ad5772e7d1756e9457046189b0dfc, 8652d44f466ad5772e7d1756e9457046189b0dfc, 4947a0eb7d642b6048559857964966016ef3aa8b, b16bf76b382810257e3fb6278663a9d131b70197, cb1638618545182a01444b2b20a4ed6b9d2a8c8f, 6.4, 6.19.5

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/027797595a108726f4a0a45d225f603b0ffbd22b
  • https://git.kernel.org/stable/c/1737d37ae1d2814e6cf0a1af87af3d41f0812b95
  • https://git.kernel.org/stable/c/f736032c638a33a243e9126e617788f763d648f9
  • https://git.kernel.org/stable/c/cfccd3b8c51bc57a8a6fcb2fd30453afae5bc0d2
  • https://git.kernel.org/stable/c/875355152b33436907c2a6d2ffad1431fa86c62b
  • https://git.kernel.org/stable/c/36eb314184a0ae74dd42914b47d2b9fc43be8034
  • https://git.kernel.org/stable/c/5226570bd252cea2e805a161cb0f75c204c3108a
  • https://git.kernel.org/stable/c/480e1d5c64bb14441f79f2eb9421d5e26f91ea3d

Related News (3 articles)

Tier B
BSI Advisories9h ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB3d ago
CVE-2026-43289 | Linux Kernel up to 6.19.5 kernel/kexec_file.c kexec_load_purgatory privilege escalation
→ No new info (linked only)
Tier C
Linux Kernel CVEs3d ago
CVE-2026-43289: kexec: derive purgatory entry from symbol
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
027797595a108726f4a0a45d225f603b0ffbd22b1737d37ae1d2814e6cf0a1af87af3d41f0812b95f736032c638a33a243e9126e617788f763d648f9cfccd3b8c51bc57a8a6fcb2fd30453afae5bc0d2875355152b33436907c2a6d2ffad1431fa86c62b36eb314184a0ae74dd42914b47d2b9fc43be80345226570bd252cea2e805a161cb0f75c204c3108a480e1d5c64bb14441f79f2eb9421d5e26f91ea3d05.10.2525.15.2026.1.1656.6.1286.12.756.18.166.19.67.0
PublishedMay 8, 2026
Last enriched3d agov2
Trending Score62
Source articles3
Independent3
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

IMPORTANTCVE-2026-43284EXPKEV
xfrm: esp: avoid in-place decrypt on shared skb frags
Trending: 135
HIGHCVE-2026-31431EXPKEV
crypto: algif_aead - Revert to operating out-of-place
Trending: 122
HIGHCVE-2026-43500EXPKEV
rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
Trending: 118
CRITICALCVE-2026-43312EXP
media: i2c: ov5647: Initialize subdev before controls
Trending: 62
CRITICALCVE-2025-71301EXP
drm/tests: shmem: Hold reservation lock around vmap/vunmap
Trending: 62

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 8, 2026
Actively Exploited
May 8, 2026
Patch Available
May 8, 2026
Discovered by ZDM
May 8, 2026
Updated: description, severity, affectedVersions, activelyExploited
May 8, 2026

Version History

v2
Last enriched 3d ago
v2Tier C3d ago

Updated description with details about CVE-2026-43289, changed severity to CRITICAL, and noted that no exploit exists.

descriptionseverityaffectedVersionsactivelyExploited
via VulDB
v13d ago

Initial creation