目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2026-43502— Linux net/rds 零拷贝发送清理顺序漏洞

AI 预测 5.5 利用难度: 困难

影响版本矩阵 12

厂商产品版本范围状态
LinuxLinux0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 21d70744e6d3bbf9293aa1ee6fba7c53ad75275eaffected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 3abc8983b2bae3f487f77d9da5527d7d6b210d46affected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 14ef6fd18db2494098b21e0471bf27a1d8e9993eaffected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 0f5c185fc79a59ee9991234dd6d2a3e5afa6e75baffected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 44b550d88b267320459d518c0743a241ab2108faaffected
4.17affected
< 4.17unaffected
6.6.140≤ 6.6.*unaffected
… +4 条更多
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-43502 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
net/rds: handle zerocopy send cleanup before the message is queued
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/rds: handle zerocopy send cleanup before the message is queued A zerocopy send can fail after user pages have been pinned but before the message is attached to the sending socket. The purge path currently infers zerocopy state from rm->m_rs, so an unqueued message can be cleaned up as if it owned normal payload pages. However, zerocopy ownership is really determined by the presence of op_mmp_znotifier, regardless of whether the message has reached the socket queue. Capture op_mmp_znotifier up front in rds_message_purge() and use it as the cleanup discriminator. If the message is already associated with a socket, keep the existing completion path. Otherwise, drop the pinned page accounting directly and release the notifier before putting the payload pages. This keeps early send failure cleanup consistent with the zerocopy lifetime rules without changing the normal queued completion path.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3 ~ 21d70744e6d3bbf9293aa1ee6fba7c53ad75275e -
LinuxLinux 4.17 -

二、漏洞 CVE-2026-43502 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-43502 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2026-05-21 · 共 8 条

CVE-2026-43501IPv6 RPL SRH压缩增长时mac_len头空间预留漏洞
CVE-2026-43498Linux内核accel/ivpu模块对象重导出漏洞
CVE-2026-43499Linux 内核 rtmutex 远程代码执行漏洞
CVE-2026-43497udlfb 漏洞:添加 vm_ops 防止使用后即释放
CVE-2026-43496Linux 内核 sch_red 远程代码执行漏洞
CVE-2026-43495T7xx WWAN 驱动端口计数验证缺失漏洞
CVE-2026-43494net/rds 零复制页面固定失败时未重置op_nents漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-43502

暂无评论


发表评论