目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-43465— Linux kernel 安全漏洞

CVSS 9.8 · Critical EPSS 0.02% · P4
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-43465 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
net/mlx5e: RX, Fix XDP multi-buf frag counting for striding RQ
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-buf frag counting for striding RQ XDP multi-buf programs can modify the layout of the XDP buffer when the program calls bpf_xdp_pull_data() or bpf_xdp_adjust_tail(). The referenced commit in the fixes tag corrected the assumption in the mlx5 driver that the XDP buffer layout doesn't change during a program execution. However, this fix introduced another issue: the dropped fragments still need to be counted on the driver side to avoid page fragment reference counting issues. The issue was discovered by the drivers/net/xdp.py selftest, more specifically the test_xdp_native_tx_mb: - The mlx5 driver allocates a page_pool page and initializes it with a frag counter of 64 (pp_ref_count=64) and the internal frag counter to 0. - The test sends one packet with no payload. - On RX (mlx5e_skb_from_cqe_mpwrq_nonlinear()), mlx5 configures the XDP buffer with the packet data starting in the first fragment which is the page mentioned above. - The XDP program runs and calls bpf_xdp_pull_data() which moves the header into the linear part of the XDP buffer. As the packet doesn't contain more data, the program drops the tail fragment since it no longer contains any payload (pp_ref_count=63). - mlx5 device skips counting this fragment. Internal frag counter remains 0. - mlx5 releases all 64 fragments of the page but page pp_ref_count is 63 => negative reference counting error. Resulting splat during the test: WARNING: CPU: 0 PID: 188225 at ./include/net/page_pool/helpers.h:297 mlx5e_page_release_fragmented.isra.0+0xbd/0xe0 [mlx5_core] Modules linked in: [...] CPU: 0 UID: 0 PID: 188225 Comm: ip Not tainted 6.18.0-rc7_for_upstream_min_debug_2025_12_08_11_44 #1 NONE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:mlx5e_page_release_fragmented.isra.0+0xbd/0xe0 [mlx5_core] [...] Call Trace: <TASK> mlx5e_free_rx_mpwqe+0x20a/0x250 [mlx5_core] mlx5e_dealloc_rx_mpwqe+0x37/0xb0 [mlx5_core] mlx5e_free_rx_descs+0x11a/0x170 [mlx5_core] mlx5e_close_rq+0x78/0xa0 [mlx5_core] mlx5e_close_queues+0x46/0x2a0 [mlx5_core] mlx5e_close_channel+0x24/0x90 [mlx5_core] mlx5e_close_channels+0x5d/0xf0 [mlx5_core] mlx5e_safe_switch_params+0x2ec/0x380 [mlx5_core] mlx5e_change_mtu+0x11d/0x490 [mlx5_core] mlx5e_change_nic_mtu+0x19/0x30 [mlx5_core] netif_set_mtu_ext+0xfc/0x240 do_setlink.isra.0+0x226/0x1100 rtnl_newlink+0x7a9/0xba0 rtnetlink_rcv_msg+0x220/0x3c0 netlink_rcv_skb+0x4b/0xf0 netlink_unicast+0x255/0x380 netlink_sendmsg+0x1f3/0x420 __sock_sendmsg+0x38/0x60 ____sys_sendmsg+0x1e8/0x240 ___sys_sendmsg+0x7c/0xb0 [...] __sys_sendmsg+0x5f/0xb0 do_syscall_64+0x55/0xc70 The problem applies for XDP_PASS as well which is handled in a different code path in the driver. This patch fixes the issue by doing page frag counting on all the original XDP buffer fragments for all relevant XDP actions (XDP_TX , XDP_REDIRECT and XDP_PASS). This is basically reverting to the original counting before the commit in the fixes tag. As frag_page is still pointing to the original tail, the nr_frags parameter to xdp_update_skb_frags_info() needs to be calculated in a different way to reflect the new nr_frags.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于net mlx5e RX组件中XDP多缓冲片段计数在striding RQ中未正确跟踪释放的片段,导致页面片段引用计数问题。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 87bcef158ac1faca1bd7e0104588e8e2956d10be ~ 7d7342a18fadcdb70a63b3c930dc63528ce51832 -
LinuxLinux 6.18 -

二、漏洞 CVE-2026-43465 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-43465 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2026-05-08 · 共 199 条

CVE-2026-433769.8 CRITICALLinux kernel 安全漏洞
CVE-2026-434149.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433419.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433049.8 CRITICALLinux kernel 安全漏洞
CVE-2026-434029.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433799.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433849.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433839.4 CRITICALLinux kernel 安全漏洞
CVE-2026-434079.1 CRITICALLinux kernel 安全漏洞
CVE-2026-434069.1 CRITICALLinux kernel 安全漏洞
CVE-2026-432848.8 HIGHLinux kernel 安全漏洞
CVE-2026-433348.8 HIGHLinux kernel 安全漏洞
CVE-2026-434038.8 HIGHLinux kernel 安全漏洞
CVE-2026-433228.8 HIGHLinux kernel 安全漏洞
CVE-2026-433918.8 HIGHLinux kernel 安全漏洞
CVE-2026-432918.3 HIGHLinux kernel 安全漏洞
CVE-2026-434668.2 HIGHLinux kernel 安全漏洞
CVE-2026-434528.2 HIGHLinux kernel 安全漏洞
CVE-2026-433658.2 HIGHLinux kernel 安全漏洞
CVE-2026-433628.1 HIGHLinux kernel 安全漏洞

显示前 20 条,共 199 条。 查看全部 &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-43465

暂无评论


发表评论