Description
In the Linux kernel, the following vulnerability has been resolved:

net: ncsi: fix skb leak in error paths

Early return paths in NCSI RX and AEN handlers fail to release
the received skb, resulting in a memory leak.

Specifically, ncsi_aen_handler() returns on invalid AEN packets
without consuming the skb. Similarly, ncsi_rcv_rsp() exits early
when failing to resolve the NCSI device, response handler, or
request, leaving the skb unfreed.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s NCSI driver contains a flaw where certain error‑handling paths in the NCSI RX and AEN handlers return prematurely without freeing the socket buffer (skb) that holds incoming packets, resulting in a memory leak. This defect, classified as CWE-772, could, over time, consume kernel address space and potentially trigger a denial of service by exhausting available memory. The description indicates that the bug does not directly expose confidential data; however, persistent exploitation can degrade system stability.

Affected Systems

All Linux kernel builds that compile the NCSI driver are affected. The issue resides in the core driver code, so any kernel that includes the NCSI subsystem without the recent patch can be vulnerable. Administrators should verify whether their kernel originates from the mainline and whether the NCSI module is enabled.

Risk and Exploitability

The CVSS score is not published and the EPSS score is unavailable, so the precise risk level cannot be quantified. The vulnerability is not listed in CISA KEV, indicating no known active exploits. Based on the description, it is inferred that an attacker would need to trigger the early‑return paths by sending malformed or invalid NCSI packets to the target system. If the attacker has local or privileged access, they can repeatedly generate such traffic, gradually exhausting kernel memory. A remote attacker would need the ability to send raw NCSI traffic to the target, which is less common but still possible on exposed interfaces. The longer the flaw remains unpatched, the greater the likelihood that uncontrolled memory consumption will lead to system instability.

Generated by OpenCVE AI on May 9, 2026 at 04:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that incorporates the NCSI skb leak fix
  • If upgrading immediately is not possible, disable the NCSI driver by removing or blacklisting the module from the system
  • Continuously monitor kernel memory consumption for abnormal growth patterns as an early indicator of a leak in the NCSI subsystem

Generated by OpenCVE AI on May 9, 2026 at 04:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 08 May 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: ncsi: fix skb leak in error paths Early return paths in NCSI RX and AEN handlers fail to release the received skb, resulting in a memory leak. Specifically, ncsi_aen_handler() returns on invalid AEN packets without consuming the skb. Similarly, ncsi_rcv_rsp() exits early when failing to resolve the NCSI device, response handler, or request, leaving the skb unfreed.
Title net: ncsi: fix skb leak in error paths
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:23.875Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43373

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:48.423

Modified: 2026-05-08T15:16:48.423

Link: CVE-2026-43373

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43373 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:30:17Z

Weaknesses