The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43224

CVE-2026-43224: Linux Kernel Information Disclosure Flaw

CVE-2026-43224 is an information disclosure vulnerability in the Linux kernel's io_uring/zcrx component caused by an sgtable leak on mapping failures. This article covers technical details, affected versions, and mitigation.

Published: May 7, 2026

CVE-2026-43224 Overview

CVE-2026-43224 is a memory leak vulnerability in the Linux kernel's io_uring/zcrx (zero-copy receive) subsystem. The flaw resides in the io_zcrx_map_area() function, which fails to release an initialised scatter-gather table when io_populate_area_dma() returns an error. The error path is gated by an !is_mapped check that prevents the cleanup from executing, leaving the sgtable allocated. The condition only triggers on PAGE_POOL_32BIT_ARCH_WITH_64BIT_DMA machines, making it a narrow but real resource leak in the kernel networking I/O path.

Critical Impact

Repeated mapping failures can leak kernel sgtable allocations, contributing to resource exhaustion on affected 32-bit architectures with 64-bit DMA support.

Affected Products

  • Linux kernel versions containing the io_uring/zcrx zero-copy receive implementation
  • Systems built with PAGE_POOL_32BIT_ARCH_WITH_64BIT_DMA
  • Distributions tracking mainline and stable kernel branches prior to the referenced fix commits

Discovery Timeline

  • 2026-05-06 - CVE-2026-43224 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-43224

Vulnerability Analysis

The io_uring subsystem provides high-performance asynchronous I/O, and the zcrx component implements zero-copy receive paths backed by page pools. During area registration, io_zcrx_map_area() allocates and initialises a scatter-gather table, then calls io_populate_area_dma() to set up DMA mappings for the underlying pages.

When io_populate_area_dma() fails, control transfers to the cleanup path. That path conditionally tears down resources based on the is_mapped flag. Because mapping never completed successfully, is_mapped remains false and the cleanup branch responsible for freeing the sgtable is skipped. The allocated sg_table therefore persists past the function's lifetime without an owner, producing a kernel memory leak.

The fault only manifests on architectures defined by PAGE_POOL_32BIT_ARCH_WITH_64BIT_DMA, where the kernel must perform additional DMA address handling. Although the failure path is described as unlikely, repeated triggering by an attacker with the ability to register zcrx areas can degrade kernel memory availability over time.

Root Cause

The root cause is incorrect error-path logic in io_zcrx_map_area(). The !is_mapped gate excludes the sgtable release call from running when io_populate_area_dma() fails before mapping completes, even though the table was already initialised earlier in the function.

Attack Vector

Exploitation requires local access to the affected host with permissions to invoke io_uring registration ioctls against zcrx areas, and the host must be a PAGE_POOL_32BIT_ARCH_WITH_64BIT_DMA build. Repeatedly inducing io_populate_area_dma() failures leaks kernel scatter-gather tables, leading to a denial-of-service style resource exhaustion. The flaw does not provide direct code execution or privilege escalation.

The vulnerability is described in prose because no public proof-of-concept code is referenced. Refer to the upstream patch commits for the precise diff and behavioural change: Kernel Patch Commit a983aae39776, Kernel Patch Commit ef075c1464ac, and Kernel Patch Commit f1ae40332431.

Detection Methods for CVE-2026-43224

Indicators of Compromise

  • Gradual decline in available kernel memory on long-running hosts that use io_uring zero-copy receive
  • Repeated io_uring_register() calls targeting zcrx areas from a single user-space process
  • dmesg warnings or page allocator pressure messages tied to scatter-gather or DMA mapping failures

Detection Strategies

  • Audit running kernel versions against the fix commits a983aae39776, ef075c1464ac, and f1ae40332431 to identify unpatched hosts.
  • Track slabinfo growth for sg_table-related caches over time on hosts using io_uring zcrx workloads.
  • Correlate kernel log entries indicating DMA mapping errors with unexpected memory consumption trends.

Monitoring Recommendations

  • Enable kernel memory accounting and alert on sustained growth of unreclaimable slab memory.
  • Monitor io_uring syscall usage per process, especially IORING_REGISTER_* operations against network areas.
  • Forward kernel logs to a centralised analytics platform to flag recurring io_populate_area_dma failures.

How to Mitigate CVE-2026-43224

Immediate Actions Required

  • Identify hosts built with PAGE_POOL_32BIT_ARCH_WITH_64BIT_DMA and prioritise them for kernel updates.
  • Apply the stable kernel update that includes the upstream fix commits referenced by this CVE.
  • Restrict io_uring use through kernel.io_uring_disabled or seccomp policies for untrusted workloads until patches are deployed.

Patch Information

The fix removes the incorrect !is_mapped gate so that an initialised sgtable is freed when io_populate_area_dma() fails. Apply the patches from the upstream stable tree: Kernel Patch Commit a983aae39776, Kernel Patch Commit ef075c1464ac, and Kernel Patch Commit f1ae40332431. Distribution-specific kernel updates that incorporate these commits should be installed once available.

Workarounds

  • Disable io_uring for unprivileged users by setting kernel.io_uring_disabled=2 via sysctl where workloads permit.
  • Avoid building or deploying kernels with PAGE_POOL_32BIT_ARCH_WITH_64BIT_DMA configurations on exposed systems until patched.
  • Use seccomp filters to block io_uring_setup and io_uring_register syscalls for workloads that do not require them.
bash
# Configuration example
# Disable io_uring for unprivileged users until the patched kernel is deployed
sudo sysctl -w kernel.io_uring_disabled=2
echo 'kernel.io_uring_disabled = 2' | sudo tee /etc/sysctl.d/99-io_uring.conf

# Verify the running kernel against the fix commits
uname -r
zcat /proc/config.gz | grep -E 'IO_URING|PAGE_POOL'

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Patch Commit a983aae39776

  • Kernel Patch Commit ef075c1464ac

  • Kernel Patch Commit f1ae40332431
  • Related CVEs
  • CVE-2026-31708: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43088: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43085: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43089: Linux Kernel Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English