In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases
If the XDP program doesn't result in XDP_PASS then we leak the
memory allocated by am65_cpsw_build_skb().
It is pointless to allocate SKB memory before running the XDP
program as we would be wasting CPU cycles for cases other than XDP_PASS.
Move the SKB allocation after evaluating the XDP program result.
This fixes the memleak. A performance boost is seen for XDP_DROP test.
XDP_DROP test:
Before: 460256 rx/s 0 err/s
After: 784130 rx/s 0 err/s
Metrics
Affected Vendors & Products
References
History
Wed, 12 Mar 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-401 |
Fri, 28 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases If the XDP program doesn't result in XDP_PASS then we leak the memory allocated by am65_cpsw_build_skb(). It is pointless to allocate SKB memory before running the XDP program as we would be wasting CPU cycles for cases other than XDP_PASS. Move the SKB allocation after evaluating the XDP program result. This fixes the memleak. A performance boost is seen for XDP_DROP test. XDP_DROP test: Before: 460256 rx/s 0 err/s After: 784130 rx/s 0 err/s | |
Title | net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-03-24T15:40:24.624Z
Reserved: 2024-12-29T08:45:45.766Z
Link: CVE-2025-21788

No data.

Status : Received
Published: 2025-02-27T03:15:19.663
Modified: 2025-02-27T03:15:19.663
Link: CVE-2025-21788
