e1000/e1000e: Fix leak in DMA error cleanup

Summary

CVECVE-2026-43445
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-08 15:16:56 UTC
Updated2026-05-12 14:10:27 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: e1000/e1000e: Fix leak in DMA error cleanup If an error is encountered while mapping TX buffers, the driver should unmap any buffers already mapped for that skb. Because count is incremented after a successful mapping, it will always match the correct number of unmappings needed when dma_error is reached. Decrementing count before the while loop in dma_error causes an off-by-one error. If any mapping was successful before an unsuccessful mapping, exactly one DMA mapping would leak. In these commits, a faulty while condition caused an infinite loop in dma_error: Commit 03b1320dfcee ("e1000e: remove use of skb_dma_map from e1000e driver") Commit 602c0554d7b0 ("e1000: remove use of skb_dma_map from e1000 driver") Commit c1fa347f20f1 ("e1000/e1000e/igb/igbvf/ixgb/ixgbe: Fix tests of unsigned in *_tx_map()") fixed the infinite loop, but introduced the off-by-one error. This issue may still exist in the igbvf driver, but I did not address it in this patch.

Risk And Classification

EPSS: 0.000240000 probability, percentile 0.070360000 (date 2026-05-12)

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 7eaeb778bfaa3b2a804f89321c234d59c74569db git Not specified
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 0606c24a745bafd1be5d66c48361638cd9cad74b git Not specified
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 519051c711dfd239ef6e4b28878efee400a035f9 git Not specified
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 0a1fc25deabab4efce64610e3c449485c4fa8f5f git Not specified
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 fa5ba9867a55e640df0dc79bf0199770fb043f03 git Not specified
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 30e87ade8d678c25a8546cf38c0b498fa5cb27d3 git Not specified
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 10b5e65959e955a1c8894e0a5413944b5a70204a git Not specified
CNA Linux Linux affected c1fa347f20f17f14a4a1575727fa24340e8a9117 e94eaef11142b01f77bf8ba4d0b59720b7858109 git Not specified
CNA Linux Linux affected 2.6.33 Not specified
CNA Linux Linux unaffected 2.6.33 semver Not specified
CNA Linux Linux unaffected 5.10.253 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.203 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.78 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.19 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.9 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/fa5ba9867a55e640df0dc79bf0199770fb043f03 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/30e87ade8d678c25a8546cf38c0b498fa5cb27d3 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/10b5e65959e955a1c8894e0a5413944b5a70204a 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/7eaeb778bfaa3b2a804f89321c234d59c74569db 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/e94eaef11142b01f77bf8ba4d0b59720b7858109 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/0606c24a745bafd1be5d66c48361638cd9cad74b 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/0a1fc25deabab4efce64610e3c449485c4fa8f5f 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/519051c711dfd239ef6e4b28878efee400a035f9 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report