CVE-2026-43502
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
21/05/2026
Última modificación:
21/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/rds: handle zerocopy send cleanup before the message is queued<br />
<br />
A zerocopy send can fail after user pages have been pinned but before<br />
the message is attached to the sending socket.<br />
<br />
The purge path currently infers zerocopy state from rm->m_rs, so an<br />
unqueued message can be cleaned up as if it owned normal payload pages.<br />
However, zerocopy ownership is really determined by the presence of<br />
op_mmp_znotifier, regardless of whether the message has reached the<br />
socket queue.<br />
<br />
Capture op_mmp_znotifier up front in rds_message_purge() and use it as<br />
the cleanup discriminator. If the message is already associated with a<br />
socket, keep the existing completion path. Otherwise, drop the pinned<br />
page accounting directly and release the notifier before putting the<br />
payload pages.<br />
<br />
This keeps early send failure cleanup consistent with the zerocopy<br />
lifetime rules without changing the normal queued completion path.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0f5c185fc79a59ee9991234dd6d2a3e5afa6e75b
- https://git.kernel.org/stable/c/14ef6fd18db2494098b21e0471bf27a1d8e9993e
- https://git.kernel.org/stable/c/21d70744e6d3bbf9293aa1ee6fba7c53ad75275e
- https://git.kernel.org/stable/c/3abc8983b2bae3f487f77d9da5527d7d6b210d46
- https://git.kernel.org/stable/c/44b550d88b267320459d518c0743a241ab2108fa



