CVE-2026-43371
Memory Leak in Linux Kernel macb Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's macb network driver. When using an NFS root filesystem on an AMD ZynqMp board, the system may experience a long recovery time after suspend due to how the transmit (tx) ring buffer is handled.
The issue arises because the driver resets the transmit buffer queue pointers (tx_head and tx_tail) to zero without properly handling packets already queued. This causes packets to be silently lost, leading to memory leaks since the associated socket buffers (skbs) are not released.
Additionally, concurrent access to these pointers can cause transmission to get stuck on packets that have been sent but not processed, because the driver incorrectly assumes there are no packets to handle when tx_head equals tx_tail.
The fix involves shuffling the tx ring and skb array so that the first unsent packet is at the start of the tx ring and protecting updates to tx_head and tx_tail with proper locking to avoid concurrency issues.
How can this vulnerability impact me? :
This vulnerability can cause prolonged recovery times after system suspend when using NFS root filesystems on affected hardware, such as the AMD ZynqMp board.
It can lead to memory leaks due to lost packets that are not properly released, potentially degrading system performance or stability over time.
Transmission may become stuck on packets that have already been sent but not processed, causing network communication delays or failures.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by shuffling the tx ring and tx skb array so that the first unsent packet is positioned at the start of the tx ring.
Additionally, ensure that updates to the transmit queue pointers (queue->tx_head and queue->tx_tail) are properly protected with the appropriate lock to prevent concurrent write access issues.
Applying the updated Linux kernel version that includes this fix is the recommended immediate mitigation step.