Description
In the Linux kernel, the following vulnerability has been resolved:

net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode

Page recycling was removed from the XDP_DROP path in emac_run_xdp() to
avoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free()
instead.

However, this causes a memory leak when running XDP programs that drop
packets in non-zero-copy mode (standard page pool mode). The pages are
never returned to the page pool, leading to OOM conditions.

Fix this by handling cleanup in the caller, emac_rx_packet().
When emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the
caller now recycles the page back to the page pool. The zero-copy
path, emac_rx_packet_zc() already handles cleanup correctly with
xsk_buff_free().
Published: 2026-04-03
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (Out‑of‑Memory)
Action: Patch
AI Analysis

Impact

When XDP programs drop packets in non‑zero‑copy mode, the driver no longer recycles the associated page buffers, causing a memory leak that can deplete system memory and trigger an out‑of‑memory kill. This represents a classic memory‑leak weakness (CWE‑772) that can lead to a denial‑of‑service state affecting the entire host because the kernel eventually terminates processes or the system.

Affected Systems

The flaw exists in the Linux kernel’s TI ICSSG PRU Ethernet driver (net:ti:icssg‑prueth). Any Linux kernel release that has not incorporated the patch commit is affected, regardless of distribution. No specific version range is provided, so any kernel before the fix should be considered vulnerable.

Risk and Exploitability

The EPSS score for the vulnerability is below 1 %, indicating a low likelihood of exploitation. The CVSS score is 7.5, reflecting a high severity. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker would need to deliver packets that are processed by an XDP program performing XDP_DROP in standard page‑pool mode to trigger the memory leak. Exploitation requires local kernel execution via legitimate traffic rather than a remote code‑execution vector.

Generated by OpenCVE AI on April 28, 2026 at 08:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that includes the XDP_DROP memory‑leak fix
  • If an immediate kernel upgrade is not possible, remove or disable XDP programs that drop packets in non‑zero‑copy mode from production traffic
  • Continuously monitor kernel memory usage and system logs for signs of out‑of‑memory conditions

Generated by OpenCVE AI on April 28, 2026 at 08:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode Page recycling was removed from the XDP_DROP path in emac_run_xdp() to avoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free() instead. However, this causes a memory leak when running XDP programs that drop packets in non-zero-copy mode (standard page pool mode). The pages are never returned to the page pool, leading to OOM conditions. Fix this by handling cleanup in the caller, emac_rx_packet(). When emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the caller now recycles the page back to the page pool. The zero-copy path, emac_rx_packet_zc() already handles cleanup correctly with xsk_buff_free().
Title net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-27T14:02:32.584Z

Reserved: 2026-01-13T15:37:46.020Z

Link: CVE-2026-23453

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:31.820

Modified: 2026-04-27T14:16:33.833

Link: CVE-2026-23453

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23453 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T09:00:06Z

Weaknesses