Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-43502— net/rds: handle zerocopy send cleanup before the message is queued

AI Predicted 5.5 Difficulty: Hard

Possible ATT&CK Techniques 1AI

T1499 · Endpoint Denial of Service

Affected Version Matrix 12

VendorProductVersion RangeStatus
LinuxLinux0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 21d70744e6d3bbf9293aa1ee6fba7c53ad75275eaffected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 3abc8983b2bae3f487f77d9da5527d7d6b210d46affected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 14ef6fd18db2494098b21e0471bf27a1d8e9993eaffected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 0f5c185fc79a59ee9991234dd6d2a3e5afa6e75baffected
0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3< 44b550d88b267320459d518c0743a241ab2108faaffected
4.17affected
< 4.17unaffected
6.6.140≤ 6.6.*unaffected
… +4 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43502

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net/rds: handle zerocopy send cleanup before the message is queued
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/rds: handle zerocopy send cleanup before the message is queued A zerocopy send can fail after user pages have been pinned but before the message is attached to the sending socket. The purge path currently infers zerocopy state from rm->m_rs, so an unqueued message can be cleaned up as if it owned normal payload pages. However, zerocopy ownership is really determined by the presence of op_mmp_znotifier, regardless of whether the message has reached the socket queue. Capture op_mmp_znotifier up front in rds_message_purge() and use it as the cleanup discriminator. If the message is already associated with a socket, keep the existing completion path. Otherwise, drop the pinned page accounting directly and release the notifier before putting the payload pages. This keeps early send failure cleanup consistent with the zerocopy lifetime rules without changing the normal queued completion path.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 0cebaccef3acbdfbc2d85880a2efb765d2f4e2e3 ~ 21d70744e6d3bbf9293aa1ee6fba7c53ad75275e -
LinuxLinux 4.17 -

II. Public POCs for CVE-2026-43502

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43502

登录查看更多情报信息。
Patch · 5

Same Patch Batch · Linux · 2026-05-21 · 8 CVEs total

CVE-2026-43501ipv6: rpl: reserve mac_len headroom when recompressed SRH grows
CVE-2026-43498accel/ivpu: Disallow re-exporting imported GEM objects
CVE-2026-43499rtmutex: Use waiter::task instead of current in remove_waiter()
CVE-2026-43497fbdev: udlfb: add vm_ops to dlfb_ops_mmap to prevent use-after-free
CVE-2026-43496net/sched: sch_red: Replace direct dequeue call with peek and qdisc_dequeue_peeked
CVE-2026-43495net: wwan: t7xx: validate port_count against message length in t7xx_port_enum_msg_handler
CVE-2026-43494net/rds: reset op_nents when zerocopy page pin fails

IV. Related Vulnerabilities

V. Comments for CVE-2026-43502

No comments yet


Leave a comment