Description
In the Linux kernel, the following vulnerability has been resolved:

rnbd-srv: Zero the rsp buffer before using it

Before using the data buffer to send back the response message, zero it
completely. This prevents any stray bytes to be picked up by the client
side when there the message is exchanged between different protocol
versions.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability occurs in the Linux kernel rnbd server when the response buffer is used without zeroing it, allowing stale data from previous protocol exchanges to leak to a client. The result is that a client can read data that it should not have access to, thereby exposing confidential information. No integrity or availability impact is described in the available information.

Affected Systems

All Linux kernels that run the rnbd server are potentially affected; the exact versions are not listed, so any kernel containing the unpatched rnbd_s code should be considered at risk until the patch is applied.

Risk and Exploitability

There is no EPSS score or CVSS value provided, and the vulnerability is not listed in CISA KEV. Because the bug involves a memory leak within kernel space, the most likely attack vector is a local attacker with kernel privileges or a victim of a kernel exploitation that can read the leaked buffer. The lack of detailed metrics suggests a moderate risk, but any exploitation would compromise confidentiality.

Generated by OpenCVE AI on May 6, 2026 at 14:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to the latest stable release that includes the patch for rnbd-srv zeroing the rsp buffer
  • If a quick kernel upgrade is not possible, restrict or disable the rnbd service on the host to eliminate the exposure
  • After applying the patch, verify that the rsp buffer is correctly zeroed by inspecting the source or providing a local test that asserts no stale data is returned

Generated by OpenCVE AI on May 6, 2026 at 14:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: rnbd-srv: Zero the rsp buffer before using it Before using the data buffer to send back the response message, zero it completely. This prevents any stray bytes to be picked up by the client side when there the message is exchanged between different protocol versions.
Title rnbd-srv: Zero the rsp buffer before using it
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:55.672Z

Reserved: 2026-05-01T14:12:55.991Z

Link: CVE-2026-43184

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:37.053

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43184

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:15:06Z

Weaknesses