Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3376 articles · 142302 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-43295EXPLOITEDPATCHED
linux · linux kernel

rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net()

Description

A vulnerability was found in Linux Kernel up to 6.19.5. It has been rated as critical. Affected is the function rio_free_net of the component rapidio. The manipulation leads to allocation of resources. This vulnerability is referenced as CVE-2026-43295. The attack needs to be initiated within the local network. No exploit is available. Upgrading the affected component is advised.

Affected Products

VendorProductVersions
linuxlinux kernele6b585ca6e81badeb3d42db3cc408174f2826034, e6b585ca6e81badeb3d42db3cc408174f2826034, e6b585ca6e81badeb3d42db3cc408174f2826034, e6b585ca6e81badeb3d42db3cc408174f2826034, e6b585ca6e81badeb3d42db3cc408174f2826034, e6b585ca6e81badeb3d42db3cc408174f2826034, e6b585ca6e81badeb3d42db3cc408174f2826034, e6b585ca6e81badeb3d42db3cc408174f2826034, 4.6, 6.19.5

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/83e579c2f7f6b1706323d744833b26470049dcc2
  • https://git.kernel.org/stable/c/34a4f233df5eef5f1f113b2196142c0568b387f8
  • https://git.kernel.org/stable/c/fecf292c6691970897396190855aa38826b7104e
  • https://git.kernel.org/stable/c/649c2e853608cad0b0cba545555d168e67f094b3
  • https://git.kernel.org/stable/c/87272e3e70ec4b666885bd520ff77463c11444ef
  • https://git.kernel.org/stable/c/e5a732bfe29451e16abf9c6f07ce5948b22f3d59
  • https://git.kernel.org/stable/c/78812c4fb7ed242d5961bf1337a49070d6487c94
  • https://git.kernel.org/stable/c/666183dcdd9ad3b8156a1df7f204f728f720380f

Related News (3 articles)

Tier B
BSI Advisories12h ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB3d ago
CVE-2026-43295 | Linux Kernel up to 6.19.5 rapidio rio_free_net allocation of resources
→ No new info (linked only)
Tier C
Linux Kernel CVEs3d ago
CVE-2026-43295: rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net()
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
83e579c2f7f6b1706323d744833b26470049dcc234a4f233df5eef5f1f113b2196142c0568b387f8fecf292c6691970897396190855aa38826b7104e649c2e853608cad0b0cba545555d168e67f094b387272e3e70ec4b666885bd520ff77463c11444efe5a732bfe29451e16abf9c6f07ce5948b22f3d5978812c4fb7ed242d5961bf1337a49070d6487c94666183dcdd9ad3b8156a1df7f204f728f720380f05.10.2525.15.2026.1.1656.6.1286.12.756.18.166.19.67.0
PublishedMay 8, 2026
Last enriched3d agov2
Trending Score61
Source articles3
Independent3
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

IMPORTANTCVE-2026-43284EXPKEV
xfrm: esp: avoid in-place decrypt on shared skb frags
Trending: 133
HIGHCVE-2026-43500EXPKEV
rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
Trending: 117
HIGHCVE-2026-31431EXPKEV
crypto: algif_aead - Revert to operating out-of-place
Trending: 116
CRITICALCVE-2025-71296EXP
drm/tests: shmem: Hold reservation lock around purge
Trending: 61
CRITICALCVE-2026-43297EXP
media: rockchip: rga: Fix possible ERR_PTR dereference in rga_buf_init()
Trending: 61

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 8, 2026
Actively Exploited
May 8, 2026
Patch Available
May 8, 2026
Discovered by ZDM
May 8, 2026
Updated: description, severity, affectedVersions, activelyExploited
May 8, 2026

Version History

v2
Last enriched 3d ago
v2Tier C3d ago

Updated severity to CRITICAL, added affected version 6.19.5, and corrected exploit availability to false.

descriptionseverityaffectedVersionsactivelyExploited
via VulDB
v13d ago

Initial creation