Description
In the Linux kernel, the following vulnerability has been resolved:

net/rds: handle zerocopy send cleanup before the message is queued

A zerocopy send can fail after user pages have been pinned but before
the message is attached to the sending socket.

The purge path currently infers zerocopy state from rm->m_rs, so an
unqueued message can be cleaned up as if it owned normal payload pages.
However, zerocopy ownership is really determined by the presence of
op_mmp_znotifier, regardless of whether the message has reached the
socket queue.

Capture op_mmp_znotifier up front in rds_message_purge() and use it as
the cleanup discriminator. If the message is already associated with a
socket, keep the existing completion path. Otherwise, drop the pinned
page accounting directly and release the notifier before putting the
payload pages.

This keeps early send failure cleanup consistent with the zerocopy
lifetime rules without changing the normal queued completion path.
Published: 2026-05-21
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s RDS networking stack contains a flaw in the zerocopy send cleanup logic that can misclassify a message as owning normal payload pages when the message has not yet been queued. This incorrect cleanup can drop or reuse pinned pages in violation of their intended lifetimes, potentially corrupting kernel memory and triggering a kernel panic or other instability. The impact is a denial‑of‑service condition caused by a kernel crash rather than direct data exposure or remote code execution.

Affected Systems

All Linux kernel releases that include the RDS protocol and have not yet incorporated the commit series fixing the zero‑copy send cleanup are affected. No explicit kernel version range is documented, so any installation of the RDS subsystem prior to the referenced patches should be considered vulnerable.

Risk and Exploitability

The advisory does not provide a CVSS or EPSS score, and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not a current high‑risk threat. The likely attack vector is local; an attacker who can generate RDS packets or otherwise initiate a zerocopy send to the host could trigger the inconsistent cleanup and induce a kernel crash. Because the flaw leads to kernel memory corruption without a demonstrated direct code execution path, exploitation requires a local presence and is therefore considered more complex than remote exploits.

Generated by OpenCVE AI on May 21, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains the patch for the RDS zerocopy send cleanup bug.
  • If an immediate kernel upgrade is not feasible, disable the RDS protocol (e.g., set the sysctl net.rds.enabled=0, unload the rds module, or block RDS traffic with firewall rules).
  • Monitor kernel logs such as dmesg and /var/log/kern.log for signs of RDS‑related crashes or memory corruption and apply patches or mitigations as soon as they become available.

Generated by OpenCVE AI on May 21, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CWE-590

Thu, 21 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net/rds: handle zerocopy send cleanup before the message is queued A zerocopy send can fail after user pages have been pinned but before the message is attached to the sending socket. The purge path currently infers zerocopy state from rm->m_rs, so an unqueued message can be cleaned up as if it owned normal payload pages. However, zerocopy ownership is really determined by the presence of op_mmp_znotifier, regardless of whether the message has reached the socket queue. Capture op_mmp_znotifier up front in rds_message_purge() and use it as the cleanup discriminator. If the message is already associated with a socket, keep the existing completion path. Otherwise, drop the pinned page accounting directly and release the notifier before putting the payload pages. This keeps early send failure cleanup consistent with the zerocopy lifetime rules without changing the normal queued completion path.
Title net/rds: handle zerocopy send cleanup before the message is queued
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-21T12:17:50.444Z

Reserved: 2026-05-01T14:12:56.014Z

Link: CVE-2026-43502

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T13:16:19.520

Modified: 2026-05-21T13:16:19.520

Link: CVE-2026-43502

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T16:45:14Z

Weaknesses