CVE-2025-21788

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases If the XDP program doesn't result in XDP_PASS then we leak the memory allocated by am65_cpsw_build_skb(). It is pointless to allocate SKB memory before running the XDP program as we would be wasting CPU cycles for cases other than XDP_PASS. Move the SKB allocation after evaluating the XDP program result. This fixes the memleak. A performance boost is seen for XDP_DROP test. XDP_DROP test: Before: 460256 rx/s 0 err/s After: 784130 rx/s 0 err/s
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

01 Oct 2025, 20:18

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethernet: ti: am65-cpsw: corrige la fuga de memoria en ciertos casos de XDP Si el programa XDP no da como resultado XDP_PASS, filtramos la memoria asignada por am65_cpsw_build_skb(). No tiene sentido asignar memoria SKB antes de ejecutar el programa XDP, ya que estaríamos desperdiciando ciclos de CPU para casos distintos a XDP_PASS. Mueva la asignación de SKB después de evaluar el resultado del programa XDP. Esto corrige la fuga de memoria. Se observa una mejora en el rendimiento de la prueba XDP_DROP. Prueba XDP_DROP: Antes: 460256 rx/s 0 err/s Después: 784130 rx/s 0 err/s
CWE CWE-401
References () https://git.kernel.org/stable/c/1bba1d042107167164a0ae3a843fdf650ab005d7 - () https://git.kernel.org/stable/c/1bba1d042107167164a0ae3a843fdf650ab005d7 - Mailing List, Patch
References () https://git.kernel.org/stable/c/5db843258de1e4e6b1ef1cbd1797923c9e3de548 - () https://git.kernel.org/stable/c/5db843258de1e4e6b1ef1cbd1797923c9e3de548 - Mailing List, Patch
References () https://git.kernel.org/stable/c/dc11f049612b9d926aca2e55f8dc9d82850d0da3 - () https://git.kernel.org/stable/c/dc11f049612b9d926aca2e55f8dc9d82850d0da3 - Mailing List, Patch

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-10-01 20:18


NVD link : CVE-2025-21788

Mitre link : CVE-2025-21788

CVE.ORG link : CVE-2025-21788


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime