目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1110

100%

CVE-2026-43503— Linux内核skbuff合并时共享碎片标记丢失漏洞

AI 预测 7.5 利用难度: 中等 EPSS 0.02% · P7

可能的 ATT&CK 技术 1AI

T1499 · Endpoint Denial of Service

影响版本矩阵 16

厂商产品版本范围状态
LinuxLinuxcef401de7be8c4e155c6746bfccf721a4fa5fab9< fbeab9555564a1b98e8582cd106dfe46c4606991affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 179f1852bdedc300e373e807cc102cd81feff196affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 12401fcfb01f53ccc63ab0a3246570fe8f3105eeaffected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 989214c66884d70716d83dc1d0bf5e16287bf349affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< fc6eb39c55e97df2f94ad974b8a5bbcd019da2c8affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< ff375cc75f9167168db38e0464a482d5fbc8d81daffected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 9bc9d6d6967a2239aa57af2aa53554eddd640d20affected
3.9affected
… +8 条更多
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-43503 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
net: skbuff: propagate shared-frag marker through frag-transfer helpers
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: skbuff: propagate shared-frag marker through frag-transfer helpers Two frag-transfer helpers (__pskb_copy_fclone() and skb_shift()) fail to propagate the SKBFL_SHARED_FRAG bit in skb_shinfo()->flags when moving frags from source to destination. __pskb_copy_fclone() defers the rest of the shinfo metadata to skb_copy_header() after copying frag descriptors, but that helper only carries over gso_{size,segs, type} and never touches skb_shinfo()->flags; skb_shift() moves frag descriptors directly and leaves flags untouched. As a result, the destination skb keeps a reference to the same externally-owned or page-cache-backed pages while reporting skb_has_shared_frag() as false. The mismatch is harmful in any in-place writer that uses skb_has_shared_frag() to decide whether shared pages must be detoured through skb_cow_data(). ESP input is one such writer (esp4.c, esp6.c), and a single nft 'dup to <local>' rule -- or any other nf_dup_ipv4() / xt_TEE caller -- is enough to land a pskb_copy()'d skb in esp_input() with the marker stripped, letting an unprivileged user write into the page cache of a root-owned read-only file via authencesn-ESN stray writes. Set SKBFL_SHARED_FRAG on the destination whenever frag descriptors were actually moved from the source. skb_copy() and skb_copy_expand() share skb_copy_header() too but linearize all paged data into freshly allocated head storage and emerge with nr_frags == 0, so skb_has_shared_frag() returns false on its own; they need no change. The same omission exists in skb_gro_receive() and skb_gro_receive_list(). The former moves the incoming skb's frag descriptors into the accumulator's last sub-skb via two paths (a direct frag-move loop and the head_frag + memcpy path); the latter chains the incoming skb whole onto p's frag_list. Downstream skb_segment() reads only skb_shinfo(p)->flags, and skb_segment_list() reuses each sub-skb's shinfo as the nskb -- both p and lp must carry the marker. The same omission also exists in tcp_clone_payload(), which builds an MTU probe skb by moving frag descriptors from skbs on sk_write_queue into a freshly allocated nskb. The helper falls into the same family and warrants the same fix for consistency; no TCP TX-side in-place writer is currently known to reach a user page through this gap, but a future consumer depending on the marker would regress silently. The same omission exists in skb_segment(): the per-iteration flag merge takes only head_skb's flag, and the inner switch that rebinds frag_skb to list_skb on head_skb-frags exhaustion does not fold the new frag_skb's flag into nskb. Fold frag_skb's flag at both sites so segments drawing frags from frag_list members carry the marker.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux cef401de7be8c4e155c6746bfccf721a4fa5fab9 ~ fbeab9555564a1b98e8582cd106dfe46c4606991 -
LinuxLinux 3.9 -

二、漏洞 CVE-2026-43503 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-43503 的情报信息

登录查看更多情报信息。

CVE-2026-43503 补丁与修复 (14)

IV. Related Vulnerabilities

V. Comments for CVE-2026-43503

暂无评论


发表评论