CVE-2026-31501

CRITICAL

net: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path cppi5_hdesc_get_psdata() returns a pointer into the CPPI descriptor. In both emac_rx_packet() and emac_rx_packet_zc(), the descriptor is freed via k3_cppi_desc_pool_free() before the psdata pointer is used by emac_rx_timestamp(), which dereferences psdata[0] and psdata[1]. This constitutes a use-after-free on every received packet that goes through the timestamp path. Defer the descriptor free until after all accesses through the psdata pointer are complete. For emac_rx_packet(), move the free into the requeue label so both early-exit and success paths free the descriptor after all accesses are done. For emac_rx_packet_zc(), move the free to the end of the loop body after emac_dispatch_skb_zc() (which calls emac_rx_timestamp()) has returned.

Scores

CVSS v3 9.8
EPSS 0.0006
EPSS Percentile 17.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-416
Status published
Products (9)
Linux/Linux < 6.15
Linux/Linux 46eeb90f03e03d5e8f7f9f1f0eb0792104fc5f86 - d5827316debcb677679bb014885d7be92c410e11
Linux/Linux 46eeb90f03e03d5e8f7f9f1f0eb0792104fc5f86 - eb8c426c9803beb171f89d15fea17505eb517714
Linux/Linux 6.15
Linux/Linux 6.19.11 - 6.19.*
Linux/Linux 7.0
linux/linux_kernel 6.15
linux/linux_kernel 7.0 rc1 (7 CPE variants)
linux/linux_kernel 6.15.1 - 6.19.11
Published Apr 22, 2026
Tracked Since Apr 22, 2026