目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2026-43501— IPv6 RPL SRH压缩增长时mac_len头空间预留漏洞

AI 预测 7.8 利用难度: 较易

可能的 ATT&CK 技术 1AI

T1498 · Network Denial of Service

影响版本矩阵 12

厂商产品版本范围状态
LinuxLinux8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3< 8e8be63465a5e80394c70324603dfea1bfdad48faffected
8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3< 4babc2d9fda2df43823b85d08a0180b68f1b0854affected
8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3< c261d07a80576dc8ccf394ef8f074f8c67a06b37affected
8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3< 7398ebefbfd4f8a31d4f665a4213302fa995494baffected
8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3< 9e6bf146b55999a095bb14f73a843942456d1adcaffected
5.7affected
< 5.7unaffected
6.6.140≤ 6.6.*unaffected
… +4 条更多
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-43501 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
ipv6: rpl: reserve mac_len headroom when recompressed SRH grows
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ipv6: rpl: reserve mac_len headroom when recompressed SRH grows ipv6_rpl_srh_rcv() decompresses an RFC 6554 Source Routing Header, swaps the next segment into ipv6_hdr->daddr, recompresses, then pulls the old header and pushes the new one plus the IPv6 header back. The recompressed header can be larger than the received one when the swap reduces the common-prefix length the segments share with daddr (CmprI=0, CmprE>0, seg[0][0] != daddr[0] gives the maximum +8 bytes). pskb_expand_head() was gated on segments_left == 0, so on earlier segments the push consumed unchecked headroom. Once skb_push() leaves fewer than skb->mac_len bytes in front of data, skb_mac_header_rebuild()'s call to: skb_set_mac_header(skb, -skb->mac_len); will store (data - head) - mac_len into the u16 mac_header field, which wraps to ~65530, and the following memmove() writes mac_len bytes ~64KiB past skb->head. A single AF_INET6/SOCK_RAW/IPV6_HDRINCL packet over lo with a two segment type-3 SRH (CmprI=0, CmprE=15) reaches headroom 8 after one pass; KASAN reports a 14-byte OOB write in ipv6_rthdr_rcv. Fix this by expanding the head whenever the remaining room is less than the push size plus mac_len, and request that much extra so the rebuilt MAC header fits afterwards.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3 ~ 8e8be63465a5e80394c70324603dfea1bfdad48f -
LinuxLinux 5.7 -

二、漏洞 CVE-2026-43501 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-43501 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2026-05-21 · 共 8 条

CVE-2026-43502Linux net/rds 零拷贝发送清理顺序漏洞
CVE-2026-43498Linux内核accel/ivpu模块对象重导出漏洞
CVE-2026-43499Linux 内核 rtmutex 远程代码执行漏洞
CVE-2026-43497udlfb 漏洞:添加 vm_ops 防止使用后即释放
CVE-2026-43496Linux 内核 sch_red 远程代码执行漏洞
CVE-2026-43495T7xx WWAN 驱动端口计数验证缺失漏洞
CVE-2026-43494net/rds 零复制页面固定失败时未重置op_nents漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-43501

暂无评论


发表评论