Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-43503— net: skbuff: propagate shared-frag marker through frag-transfer helpers

AI Predicted 7.5 Difficulty: Moderate EPSS 0.02% · P7

Possible ATT&CK Techniques 1AI

T1499 · Endpoint Denial of Service

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinuxcef401de7be8c4e155c6746bfccf721a4fa5fab9< fbeab9555564a1b98e8582cd106dfe46c4606991affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 179f1852bdedc300e373e807cc102cd81feff196affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 12401fcfb01f53ccc63ab0a3246570fe8f3105eeaffected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 989214c66884d70716d83dc1d0bf5e16287bf349affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< fc6eb39c55e97df2f94ad974b8a5bbcd019da2c8affected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< ff375cc75f9167168db38e0464a482d5fbc8d81daffected
cef401de7be8c4e155c6746bfccf721a4fa5fab9< 9bc9d6d6967a2239aa57af2aa53554eddd640d20affected
3.9affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43503

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net: skbuff: propagate shared-frag marker through frag-transfer helpers
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: skbuff: propagate shared-frag marker through frag-transfer helpers Two frag-transfer helpers (__pskb_copy_fclone() and skb_shift()) fail to propagate the SKBFL_SHARED_FRAG bit in skb_shinfo()->flags when moving frags from source to destination. __pskb_copy_fclone() defers the rest of the shinfo metadata to skb_copy_header() after copying frag descriptors, but that helper only carries over gso_{size,segs, type} and never touches skb_shinfo()->flags; skb_shift() moves frag descriptors directly and leaves flags untouched. As a result, the destination skb keeps a reference to the same externally-owned or page-cache-backed pages while reporting skb_has_shared_frag() as false. The mismatch is harmful in any in-place writer that uses skb_has_shared_frag() to decide whether shared pages must be detoured through skb_cow_data(). ESP input is one such writer (esp4.c, esp6.c), and a single nft 'dup to <local>' rule -- or any other nf_dup_ipv4() / xt_TEE caller -- is enough to land a pskb_copy()'d skb in esp_input() with the marker stripped, letting an unprivileged user write into the page cache of a root-owned read-only file via authencesn-ESN stray writes. Set SKBFL_SHARED_FRAG on the destination whenever frag descriptors were actually moved from the source. skb_copy() and skb_copy_expand() share skb_copy_header() too but linearize all paged data into freshly allocated head storage and emerge with nr_frags == 0, so skb_has_shared_frag() returns false on its own; they need no change. The same omission exists in skb_gro_receive() and skb_gro_receive_list(). The former moves the incoming skb's frag descriptors into the accumulator's last sub-skb via two paths (a direct frag-move loop and the head_frag + memcpy path); the latter chains the incoming skb whole onto p's frag_list. Downstream skb_segment() reads only skb_shinfo(p)->flags, and skb_segment_list() reuses each sub-skb's shinfo as the nskb -- both p and lp must carry the marker. The same omission also exists in tcp_clone_payload(), which builds an MTU probe skb by moving frag descriptors from skbs on sk_write_queue into a freshly allocated nskb. The helper falls into the same family and warrants the same fix for consistency; no TCP TX-side in-place writer is currently known to reach a user page through this gap, but a future consumer depending on the marker would regress silently. The same omission exists in skb_segment(): the per-iteration flag merge takes only head_skb's flag, and the inner switch that rebinds frag_skb to list_skb on head_skb-frags exhaustion does not fold the new frag_skb's flag into nskb. Fold frag_skb's flag at both sites so segments drawing frags from frag_list members carry the marker.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux cef401de7be8c4e155c6746bfccf721a4fa5fab9 ~ fbeab9555564a1b98e8582cd106dfe46c4606991 -
LinuxLinux 3.9 -

II. Public POCs for CVE-2026-43503

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43503

登录查看更多情报信息。

Patches & Fixes for CVE-2026-43503 (14)

IV. Related Vulnerabilities

V. Comments for CVE-2026-43503

No comments yet


Leave a comment