CVE-2026-23453 PUBLISHED

net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode

Assigner: Linux
Reserved: 13.01.2026 Published: 03.04.2026 Updated: 03.04.2026

In the Linux kernel, the following vulnerability has been resolved:

net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode

Page recycling was removed from the XDP_DROP path in emac_run_xdp() to avoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free() instead.

However, this causes a memory leak when running XDP programs that drop packets in non-zero-copy mode (standard page pool mode). The pages are never returned to the page pool, leading to OOM conditions.

Fix this by handling cleanup in the caller, emac_rx_packet(). When emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the caller now recycles the page back to the page pool. The zero-copy path, emac_rx_packet_zc() already handles cleanup correctly with xsk_buff_free().

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 7a64bb388df3cf091afdd047c701039a13acd3b4 to d16d57dedcb69c1a1257e0638f8698ce1f0ccbe5 (excl.)
  • affected from 7a64bb388df3cf091afdd047c701039a13acd3b4 to 719d3e71691db7c4f1658ba5a6d1472928121594 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.19 is affected
  • unaffected from 0 to 6.19 (excl.)
  • unaffected from 6.19.10 to 6.19.* (incl.)
  • unaffected from 7.0-rc5 to * (incl.)

References