CVE-2026-43039 PUBLISHED

net: ti: icssg-prueth: fix missing data copy and wrong recycle in ZC RX dispatch

Assigner: Linux
Reserved: 01.05.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

net: ti: icssg-prueth: fix missing data copy and wrong recycle in ZC RX dispatch

emac_dispatch_skb_zc() allocates a new skb via napi_alloc_skb() but never copies the packet data from the XDP buffer into it. The skb is passed up the stack containing uninitialized heap memory instead of the actual received packet, leaking kernel heap contents to userspace.

Copy the received packet data from the XDP buffer into the skb using skb_copy_to_linear_data().

Additionally, remove the skb_mark_for_recycle() call since the skb is backed by the NAPI page frag allocator, not page_pool. Marking a non-page_pool skb for recycle causes the free path to return pages to a page_pool that does not own them, corrupting page_pool state.

The non-ZC path (emac_rx_packet) does not have these issues because it uses napi_build_skb() to wrap the existing page_pool page directly, requiring no copy, and correctly marks for recycle since the page comes from page_pool_dev_alloc_pages().

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 7a64bb388df3cf091afdd047c701039a13acd3b4 to a968438d4fc17ee1dcdc3cfa490dcb5e7709cf76 (excl.)
  • affected from 7a64bb388df3cf091afdd047c701039a13acd3b4 to 5597dd284ff8c556c0b00f6a34473677426e3f81 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.19 is affected
  • unaffected from 0 to 6.19 (excl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References