CVE-2026-43102
Awaiting Analysis Awaiting Analysis - Queue
Memory Leak in Linux Kernel Airoha QDMA Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: net: airoha: Fix memory leak in airoha_qdma_rx_process() If an error occurs on the subsequents buffers belonging to the non-linear part of the skb (e.g. due to an error in the payload length reported by the NIC or if we consumed all the available fragments for the skb), the page_pool fragment will not be linked to the skb so it will not return to the pool in the airoha_qdma_rx_process() error path. Fix the memory leak partially reverting commit 'd6d2b0e1538d ("net: airoha: Fix page recycling in airoha_qdma_rx_process()")' and always running page_pool_put_full_page routine in the airoha_qdma_rx_process() error path.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
airoha linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a memory leak in the Linux kernel's airoha network driver, specifically in the function airoha_qdma_rx_process().

When an error occurs on the subsequent buffers of the non-linear part of the socket buffer (skb), such as due to an incorrect payload length reported by the network interface card (NIC) or if all available fragments for the skb are consumed, a page_pool fragment is not linked back to the skb.

Because of this, the page_pool fragment is not returned to the pool during the error handling path, causing a memory leak.

The fix involves partially reverting a previous commit and ensuring that the page_pool_put_full_page routine is always run in the error path of airoha_qdma_rx_process(), preventing the memory leak.


How can this vulnerability impact me? :

This vulnerability can lead to a memory leak in the Linux kernel when using the airoha network driver.

Over time, this memory leak could cause increased memory consumption, potentially degrading system performance or leading to system instability or crashes if memory resources are exhausted.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability in the Linux kernel related to the airoha driver involves a memory leak in the airoha_qdma_rx_process() function. To mitigate this vulnerability, you should update your Linux kernel to a version where this issue has been fixed.

The fix involves ensuring that the page_pool_put_full_page routine is always run in the error path of airoha_qdma_rx_process(), preventing memory leaks. Applying the patch or upgrading to a kernel version that includes this fix is the immediate recommended step.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart