Description
In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup()

Reset eBPF program pointer to old_prog and do not decrease its ref-count
if mtk_open routine in mtk_xdp_setup() fails.
Published: 2026-03-25
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Resource Exhaustion
Action: Patch
AI Analysis

Impact

A flaw in the MediaTek Ethernet driver’s XDP setup routine causes the pointer to an eBPF program to be reset to its previous value when mtk_open fails, but the reference count of the old program is not decreased. This results in a kernel memory leak that can grow over time and lead to out‑of‑memory conditions or instability. The vulnerability does not grant arbitrary code execution or data exfiltration, but it can impact confidentiality, integrity, or availability through resource exhaustion.

Affected Systems

The issue affects Linux kernel builds that include the MediaTek Ethernet driver (mtk_eth_soc) and support XDP eBPF program loading. All distributions shipping an unmodified driver before the patch commit are vulnerable; no specific kernel versions are listed, and version details from the CNA are absent.

Risk and Exploitability

The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, indicating a low likelihood of exploitation. Attackers would need the ability to load XDP programs onto a MediaTek Ethernet interface, which typically requires privileged (root) access or capabilities such as CAP_NET_ADMIN. Given the lack of an elevated CVSS score, the risk is considered low to moderate, mainly limited to memory exhaustion that could be mitigated by disabling the affected driver or XDP programs.

Generated by OpenCVE AI on March 26, 2026 at 16:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to a version that includes the mtk_eth_soc driver patch for CVE-2026-23284.
  • Verify that the running kernel matches the patched commit hash referenced in the vendor update notes.
  • If an upgrade is not immediately possible, disable XDP program usage on MediaTek Ethernet interfaces to prevent triggering the error path.
  • Monitor kernel logs for mtk_xdp_setup errors and watch for abnormal kernel memory growth.
  • If kernel memory usage climbs, consider restarting affected services or performing a system reboot to clear leaked references.

Generated by OpenCVE AI on March 26, 2026 at 16:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-398
CWE-401

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-398
CWE-401

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup() Reset eBPF program pointer to old_prog and do not decrease its ref-count if mtk_open routine in mtk_xdp_setup() fails.
Title net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:03:53.661Z

Reserved: 2026-01-13T15:37:45.992Z

Link: CVE-2026-23284

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:23.080

Modified: 2026-03-25T15:41:33.977

Link: CVE-2026-23284

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23284 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:50:19Z

Weaknesses