linux: icssg-prueth XDP_DROP memory leak in non-zero-copy mode
CVE-2026-23453 Published on April 3, 2026
net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode
In the Linux kernel, the following vulnerability has been resolved:
net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode
Page recycling was removed from the XDP_DROP path in emac_run_xdp() to
avoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free()
instead.
However, this causes a memory leak when running XDP programs that drop
packets in non-zero-copy mode (standard page pool mode). The pages are
never returned to the page pool, leading to OOM conditions.
Fix this by handling cleanup in the caller, emac_rx_packet().
When emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the
caller now recycles the page back to the page pool. The zero-copy
path, emac_rx_packet_zc() already handles cleanup correctly with
xsk_buff_free().
Products Associated with CVE-2026-23453
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 7a64bb388df3cf091afdd047c701039a13acd3b4 and below d16d57dedcb69c1a1257e0638f8698ce1f0ccbe5 is affected.
- Version 7a64bb388df3cf091afdd047c701039a13acd3b4 and below 719d3e71691db7c4f1658ba5a6d1472928121594 is affected.
- Version 6.19 is affected.
- Before 6.19 is unaffected.
- Version 6.19.10, <= 6.19.* is unaffected.
- Version 7.0-rc5, <= * is unaffected.