VYPR
Unrated severityNVD Advisory· Published May 8, 2026· Updated May 12, 2026

CVE-2026-43445

CVE-2026-43445

Description

In the Linux kernel, the following vulnerability has been resolved:

e1000/e1000e: Fix leak in DMA error cleanup

If an error is encountered while mapping TX buffers, the driver should unmap any buffers already mapped for that skb.

Because count is incremented after a successful mapping, it will always match the correct number of unmappings needed when dma_error is reached. Decrementing count before the while loop in dma_error causes an off-by-one error. If any mapping was successful before an unsuccessful mapping, exactly one DMA mapping would leak.

In these commits, a faulty while condition caused an infinite loop in dma_error: Commit 03b1320dfcee ("e1000e: remove use of skb_dma_map from e1000e driver") Commit 602c0554d7b0 ("e1000: remove use of skb_dma_map from e1000 driver")

Commit c1fa347f20f1 ("e1000/e1000e/igb/igbvf/ixgb/ixgbe: Fix tests of unsigned in *_tx_map()") fixed the infinite loop, but introduced the off-by-one error.

This issue may still exist in the igbvf driver, but I did not address it in this patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Off-by-one error in e1000/e1000e DMA error cleanup causes a single DMA mapping leak per TX buffer mapping failure.

In the Linux kernel's e1000 and e1000e network drivers, a DMA error cleanup path contains an off-by-one error. When mapping TX buffers, the driver increments a counter after each successful mapping. If a mapping fails, the cleanup loop decrements the counter before unmapping, causing one less unmapping than needed, leaving one DMA mapping leaked.

An attacker with the ability to trigger DMA mapping failures (e.g., by exhausting DMA memory or via malicious network packets) could cause the driver to leak DMA mappings. This requires local access or ability to send crafted packets to the network interface. The vulnerability is in the TX path, so any process sending network data could potentially trigger it.

Each occurrence leaks a single DMA mapping. Repeated exploitation could exhaust DMA memory, leading to denial of service (system hang or crash). No privilege escalation or data leak is indicated.

The fix is included in the Linux kernel stable commit [1]. Users should update to a kernel containing this patch. The issue may also exist in the igbvf driver but is not addressed in this patch.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.