CVE-2026-43500
Linux Kernel rxrpc Packet Handling Memory Corruption
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability could allow an attacker to exploit the way packet fragments are handled during decryption, potentially leading to unauthorized access or manipulation of data processed by the rxrpc protocol in the Linux kernel. It may enable a splice-loopback attack vector or other attacks involving shared fragment sources, which could compromise the integrity or confidentiality of network communications.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's rxrpc component, specifically in how DATA and RESPONSE packets are handled when they contain paged fragments. The issue arises because the packet handlers only unshare (make a private copy of) the packet data when the packet is cloned, but not when the packet carries externally-owned paged fragments. This can lead to the packet being processed in-place, which improperly binds fragment pages directly into cryptographic operations, potentially exposing a splice-loopback vector and other shared fragment sources.
The fix extends the unsharing condition to also cover packets that have shared fragment lists or shared fragments, preventing unsafe in-place decryption and preserving security while maintaining performance optimizations for kernel-private fragments.