In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases
If the XDP program doesn't result in XDP_PASS then we leak the
memory allocated by am65_cpsw_build_skb().
It is pointless to allocate SKB memory before running the XDP
program as we would be wasting CPU cycles for cases other than XDP_PASS.
Move the SKB allocation after evaluating the XDP program result.
This fixes the memleak. A performance boost is seen for XDP_DROP test.
XDP_DROP test:
Before: 460256 rx/s 0 err/s
After: 784130 rx/s 0 err/s
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/1bba1d042107167164a0ae3a843fdf650ab005d7 | Mailing List Patch |
https://git.kernel.org/stable/c/5db843258de1e4e6b1ef1cbd1797923c9e3de548 | Mailing List Patch |
https://git.kernel.org/stable/c/dc11f049612b9d926aca2e55f8dc9d82850d0da3 | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
01 Oct 2025, 20:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Summary |
|
|
CWE | CWE-401 | |
References | () https://git.kernel.org/stable/c/1bba1d042107167164a0ae3a843fdf650ab005d7 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/5db843258de1e4e6b1ef1cbd1797923c9e3de548 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/dc11f049612b9d926aca2e55f8dc9d82850d0da3 - Mailing List, Patch |
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-10-01 20:18
NVD link : CVE-2025-21788
Mitre link : CVE-2025-21788
CVE.ORG link : CVE-2025-21788
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime