Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43244
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:28
Updated At-11 May, 2026 | 22:20
Rejected At-
▼CVE Numbering Authority (CNA)
kcm: fix zero-frag skb in frag_list on partial sendmsg error

In the Linux kernel, the following vulnerability has been resolved: kcm: fix zero-frag skb in frag_list on partial sendmsg error Syzkaller reported a warning in kcm_write_msgs() when processing a message with a zero-fragment skb in the frag_list. When kcm_sendmsg() fills MAX_SKB_FRAGS fragments in the current skb, it allocates a new skb (tskb) and links it into the frag_list before copying data. If the copy subsequently fails (e.g. -EFAULT from user memory), tskb remains in the frag_list with zero fragments: head skb (msg being assembled, NOT yet in sk_write_queue) +-----------+ | frags[17] | (MAX_SKB_FRAGS, all filled with data) | frag_list-+--> tskb +-----------+ +----------+ | frags[0] | (empty! copy failed before filling) +----------+ For SOCK_SEQPACKET with partial data already copied, the error path saves this message via partial_message for later completion. For SOCK_SEQPACKET, sock_write_iter() automatically sets MSG_EOR, so a subsequent zero-length write(fd, NULL, 0) completes the message and queues it to sk_write_queue. kcm_write_msgs() then walks the frag_list and hits: WARN_ON(!skb_shinfo(skb)->nr_frags) TCP has a similar pattern where skbs are enqueued before data copy and cleaned up on failure via tcp_remove_empty_skb(). KCM was missing the equivalent cleanup. Fix this by tracking the predecessor skb (frag_prev) when allocating a new frag_list entry. On error, if the tail skb has zero frags, use frag_prev to unlink and free it in O(1) without walking the singly-linked frag_list. frag_prev is safe to dereference because the entire message chain is only held locally (or in kcm->seq_skb) and is not added to sk_write_queue until MSG_EOR, so the send path cannot free it underneath us. Also change the WARN_ON to WARN_ON_ONCE to avoid flooding the log if the condition is somehow hit repeatedly. There are currently no KCM selftests in the kernel tree; a simple reproducer is available at [1]. [1] https://gist.github.com/mrpre/a94d431c757e8d6f168f4dd1a3749daa

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/kcm/kcmsock.c
Default Status
unaffected
Versions
Affected
  • From ab7ac4eb9832e32a09f4e8042705484d2fb0aad3 before 9ea3671d70ee07480d80bebe86696397c4e99fb7 (git)
  • From ab7ac4eb9832e32a09f4e8042705484d2fb0aad3 before b1e3edf688a88c1a3ac41657055d9c136a08cd25 (git)
  • From ab7ac4eb9832e32a09f4e8042705484d2fb0aad3 before 7af58f76e4b404a74c836881a845e6652db8a09f (git)
  • From ab7ac4eb9832e32a09f4e8042705484d2fb0aad3 before ca220141fa8ebae09765a242076b2b77338106b0 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/kcm/kcmsock.c
Default Status
affected
Versions
Affected
  • 4.6
Unaffected
  • From 0 before 4.6 (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/9ea3671d70ee07480d80bebe86696397c4e99fb7
N/A
https://git.kernel.org/stable/c/b1e3edf688a88c1a3ac41657055d9c136a08cd25
N/A
https://git.kernel.org/stable/c/7af58f76e4b404a74c836881a845e6652db8a09f
N/A
https://git.kernel.org/stable/c/ca220141fa8ebae09765a242076b2b77338106b0
N/A
Hyperlink: https://git.kernel.org/stable/c/9ea3671d70ee07480d80bebe86696397c4e99fb7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b1e3edf688a88c1a3ac41657055d9c136a08cd25
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7af58f76e4b404a74c836881a845e6652db8a09f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ca220141fa8ebae09765a242076b2b77338106b0
Resource: N/A
Details not found