ice: Fix memory leak in ice_set_ringparam()
Summary
| CVE | CVE-2026-23389 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-25 11:16:39 UTC |
| Updated | 2026-04-11 13:16:36 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
ice: Fix memory leak in ice_set_ringparam()
In ice_set_ringparam, tx_rings and xdp_rings are allocated before
rx_rings. If the allocation of rx_rings fails, the code jumps to
the done label leaking both tx_rings and xdp_rings. Furthermore, if
the setup of an individual Rx ring fails during the loop, the code jumps
to the free_tx label which releases tx_rings but leaks xdp_rings.
Fix this by introducing a free_xdp label and updating the error paths to
ensure both xdp_rings and tx_rings are properly freed if rx_rings
allocation or setup fails.
Compile tested only. Issue found using a prototype static analysis tool
and code review. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected fcea6f3da546b93050f3534aadea7bd96c1d7349 b23282218eca27b710111460b4964c8a456c6c44 git |
Not specified |
| CNA |
Linux |
Linux |
affected fcea6f3da546b93050f3534aadea7bd96c1d7349 63dc317dfcd3faffd082c2bf3080f9ad070273da git |
Not specified |
| CNA |
Linux |
Linux |
affected fcea6f3da546b93050f3534aadea7bd96c1d7349 44ba32a892b72de3faa04b8cfb1f2f1418fdd580 git |
Not specified |
| CNA |
Linux |
Linux |
affected fcea6f3da546b93050f3534aadea7bd96c1d7349 fe868b499d16f55bbeea89992edb98043c9de416 git |
Not specified |
| CNA |
Linux |
Linux |
affected 4.17 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 4.17 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.81 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.22 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.7 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0-rc3 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/63dc317dfcd3faffd082c2bf3080f9ad070273da |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/fe868b499d16f55bbeea89992edb98043c9de416 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/44ba32a892b72de3faa04b8cfb1f2f1418fdd580 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/b23282218eca27b710111460b4964c8a456c6c44 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.