Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-43494— net/rds: reset op_nents when zerocopy page pin fails

AI Predicted 5.5 Difficulty: Moderate EPSS 0.03% · P7

Affected Version Matrix 4

VendorProductVersion RangeStatus
LinuxLinux0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< e174929793195e0cd6a4adb0cad731b39f9019b4affected
4.17affected
< 4.17unaffected
7.1-rc4≤ *unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43494

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net/rds: reset op_nents when zerocopy page pin fails
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/rds: reset op_nents when zerocopy page pin fails When iov_iter_get_pages2() fails in rds_message_zcopy_from_user(), the pinned pages are released with put_page(), and rm->data.op_mmp_znotifier is cleared. But we fail to properly clear rm->data.op_nents. Later when rds_message_purge() is called from rds_sendmsg() the cleanup loop iterates over the incorrectly non zero number of op_nents and frees them again. Fix this by properly resetting op_nents when it should be in rds_message_zcopy_from_user().
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3 ~ e174929793195e0cd6a4adb0cad731b39f9019b4 -
LinuxLinux 4.17 -

II. Public POCs for CVE-2026-43494

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43494

登录查看更多情报信息。
Patch · 1

Same Patch Batch · Linux · 2026-05-21 · 8 CVEs total

CVE-2026-43502net/rds: handle zerocopy send cleanup before the message is queued
CVE-2026-43501ipv6: rpl: reserve mac_len headroom when recompressed SRH grows
CVE-2026-43498accel/ivpu: Disallow re-exporting imported GEM objects
CVE-2026-43499rtmutex: Use waiter::task instead of current in remove_waiter()
CVE-2026-43497fbdev: udlfb: add vm_ops to dlfb_ops_mmap to prevent use-after-free
CVE-2026-43496net/sched: sch_red: Replace direct dequeue call with peek and qdisc_dequeue_peeked
CVE-2026-43495net: wwan: t7xx: validate port_count against message length in t7xx_port_enum_msg_handler

IV. Related Vulnerabilities

V. Comments for CVE-2026-43494

No comments yet


Leave a comment