目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-43009— Linux kernel 安全漏洞

CVSS 7.8 · High EPSS 0.01% · P3
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-43009 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
bpf: Fix incorrect pruning due to atomic fetch precision tracking
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix incorrect pruning due to atomic fetch precision tracking When backtrack_insn encounters a BPF_STX instruction with BPF_ATOMIC and BPF_FETCH, the src register (or r0 for BPF_CMPXCHG) also acts as a destination, thus receiving the old value from the memory location. The current backtracking logic does not account for this. It treats atomic fetch operations the same as regular stores where the src register is only an input. This leads the backtrack_insn to fail to propagate precision to the stack location, which is then not marked as precise! Later, the verifier's path pruning can incorrectly consider two states equivalent when they differ in terms of stack state. Meaning, two branches can be treated as equivalent and thus get pruned when they should not be seen as such. Fix it as follows: Extend the BPF_LDX handling in backtrack_insn to also cover atomic fetch operations via is_atomic_fetch_insn() helper. When the fetch dst register is being tracked for precision, clear it, and propagate precision over to the stack slot. For non-stack memory, the precision walk stops at the atomic instruction, same as regular BPF_LDX. This covers all fetch variants. Before: 0: (b7) r1 = 8 ; R1=8 1: (7b) *(u64 *)(r10 -8) = r1 ; R1=8 R10=fp0 fp-8=8 2: (b7) r2 = 0 ; R2=0 3: (db) r2 = atomic64_fetch_add((u64 *)(r10 -8), r2) ; R2=8 R10=fp0 fp-8=mmmmmmmm 4: (bf) r3 = r10 ; R3=fp0 R10=fp0 5: (0f) r3 += r2 mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1 mark_precise: frame0: regs=r2 stack= before 4: (bf) r3 = r10 mark_precise: frame0: regs=r2 stack= before 3: (db) r2 = atomic64_fetch_add((u64 *)(r10 -8), r2) mark_precise: frame0: regs=r2 stack= before 2: (b7) r2 = 0 6: R2=8 R3=fp8 6: (b7) r0 = 0 ; R0=0 7: (95) exit After: 0: (b7) r1 = 8 ; R1=8 1: (7b) *(u64 *)(r10 -8) = r1 ; R1=8 R10=fp0 fp-8=8 2: (b7) r2 = 0 ; R2=0 3: (db) r2 = atomic64_fetch_add((u64 *)(r10 -8), r2) ; R2=8 R10=fp0 fp-8=mmmmmmmm 4: (bf) r3 = r10 ; R3=fp0 R10=fp0 5: (0f) r3 += r2 mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1 mark_precise: frame0: regs=r2 stack= before 4: (bf) r3 = r10 mark_precise: frame0: regs=r2 stack= before 3: (db) r2 = atomic64_fetch_add((u64 *)(r10 -8), r2) mark_precise: frame0: regs= stack=-8 before 2: (b7) r2 = 0 mark_precise: frame0: regs= stack=-8 before 1: (7b) *(u64 *)(r10 -8) = r1 mark_precise: frame0: regs=r1 stack= before 0: (b7) r1 = 8 6: R2=8 R3=fp8 6: (b7) r0 = 0 ; R0=0 7: (95) exit
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于bpf回溯跟踪未正确处理原子获取操作,可能导致路径修剪错误。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 5ca419f2864a2c60940dcf4bbaeb69546200e36f ~ 7ffbe45b1d227e24659998a91cfd4c27af457e71 -
LinuxLinux 5.12 -

二、漏洞 CVE-2026-43009 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-43009 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2026-05-01 · 共 146 条

CVE-2026-430379.8 CRITICALLinux kernel 缓冲区错误漏洞
CVE-2026-430119.8 CRITICALLinux kernel 安全漏洞
CVE-2026-317059.8 CRITICALLinux kernel 安全漏洞
CVE-2026-430389.8 CRITICALLinux kernel 安全漏洞
CVE-2026-430399.8 CRITICALLinux kernel 安全漏洞
CVE-2026-317189.8 CRITICALLinux kernel 安全漏洞
CVE-2026-430188.8 HIGHLinux kernel 安全漏洞
CVE-2026-317398.8 HIGHLinux kernel 安全漏洞
CVE-2026-317068.8 HIGHLinux kernel 安全漏洞
CVE-2026-317098.8 HIGHLinux kernel 安全漏洞
CVE-2026-430488.8 HIGHLinux kernel 安全漏洞
CVE-2026-317358.8 HIGHLinux kernel 安全漏洞
CVE-2026-317738.8 HIGHLinux kernel 安全漏洞
CVE-2026-317178.8 HIGHLinux kernel 安全漏洞
CVE-2026-317128.3 HIGHLinux kernel 安全漏洞
CVE-2026-317718.1 HIGHLinux kernel 安全漏洞
CVE-2026-430518.1 HIGHLinux kernel 安全漏洞
CVE-2026-317088.1 HIGHLinux kernel 安全漏洞
CVE-2026-317798.1 HIGHLinux kernel 安全漏洞
CVE-2026-430197.8 HIGHLinux kernel 安全漏洞

显示前 20 条,共 146 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-43009

暂无评论


发表评论