目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-43323— Linux kernel 安全漏洞

EPSS 0.02% · P5
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-43323 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
sched/fair: Fix zero_vruntime tracking fix
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix zero_vruntime tracking fix John reported that stress-ng-yield could make his machine unhappy and managed to bisect it to commit b3d99f43c72b ("sched/fair: Fix zero_vruntime tracking"). The combination of yield and that commit was specific enough to hypothesize the following scenario: Suppose we have 2 runnable tasks, both doing yield. Then one will be eligible and one will not be, because the average position must be in between these two entities. Therefore, the runnable task will be eligible, and be promoted a full slice (all the tasks do is yield after all). This causes it to jump over the other task and now the other task is eligible and current is no longer. So we schedule. Since we are runnable, there is no {de,en}queue. All we have is the __{en,de}queue_entity() from {put_prev,set_next}_task(). But per the fingered commit, those two no longer move zero_vruntime. All that moves zero_vruntime are tick and full {de,en}queue. This means, that if the two tasks playing leapfrog can reach the critical speed to reach the overflow point inside one tick's worth of time, we're up a creek. Additionally, when multiple cgroups are involved, there is no guarantee the tick will in fact hit every cgroup in a timely manner. Statistically speaking it will, but that same statistics does not rule out the possibility of one cgroup not getting a tick for a significant amount of time -- however unlikely. Therefore, just like with the yield() case, force an update at the end of every slice. This ensures the update is never more than a single slice behind and the whole thing is within 2 lag bounds as per the comment on entity_key().
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于sched/fair中zero_vruntime跟踪修复问题,可能导致任务调度异常。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux d2fc2dcfce47a56ffd414783003cc966c742c8a9 ~ c089147074ed96ff4330739a0559394c19a3dfc8 -
LinuxLinux 6.12.78 ~ 6.12.81 -

二、漏洞 CVE-2026-43323 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-43323 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2026-05-08 · 共 199 条

CVE-2026-433049.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433419.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433769.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433799.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433849.8 CRITICALLinux kernel 安全漏洞
CVE-2026-434659.8 CRITICALLinux kernel 安全漏洞
CVE-2026-434029.8 CRITICALLinux kernel 安全漏洞
CVE-2026-434149.8 CRITICALLinux kernel 安全漏洞
CVE-2026-433839.4 CRITICALLinux kernel 安全漏洞
CVE-2026-434069.1 CRITICALLinux kernel 安全漏洞
CVE-2026-434079.1 CRITICALLinux kernel 安全漏洞
CVE-2026-432848.8 HIGHLinux kernel 安全漏洞
CVE-2026-433228.8 HIGHLinux kernel 安全漏洞
CVE-2026-433348.8 HIGHLinux kernel 安全漏洞
CVE-2026-433918.8 HIGHLinux kernel 安全漏洞
CVE-2026-434038.8 HIGHLinux kernel 安全漏洞
CVE-2026-432918.3 HIGHLinux kernel 安全漏洞
CVE-2026-434668.2 HIGHLinux kernel 安全漏洞
CVE-2026-434528.2 HIGHLinux kernel 安全漏洞
CVE-2026-433658.2 HIGHLinux kernel 安全漏洞

显示前 20 条,共 199 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-43323

暂无评论


发表评论