๐Ÿ” CVE Alert

CVE-2026-31501

UNKNOWN 0.0

net: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path cppi5_hdesc_get_psdata() returns a pointer into the CPPI descriptor. In both emac_rx_packet() and emac_rx_packet_zc(), the descriptor is freed via k3_cppi_desc_pool_free() before the psdata pointer is used by emac_rx_timestamp(), which dereferences psdata[0] and psdata[1]. This constitutes a use-after-free on every received packet that goes through the timestamp path. Defer the descriptor free until after all accesses through the psdata pointer are complete. For emac_rx_packet(), move the free into the requeue label so both early-exit and success paths free the descriptor after all accesses are done. For emac_rx_packet_zc(), move the free to the end of the loop body after emac_dispatch_skb_zc() (which calls emac_rx_timestamp()) has returned.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
46eeb90f03e03d5e8f7f9f1f0eb0792104fc5f86 < d5827316debcb677679bb014885d7be92c410e11 46eeb90f03e03d5e8f7f9f1f0eb0792104fc5f86 < eb8c426c9803beb171f89d15fea17505eb517714
Linux / Linux
6.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d5827316debcb677679bb014885d7be92c410e11 git.kernel.org: https://git.kernel.org/stable/c/eb8c426c9803beb171f89d15fea17505eb517714