U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-43445 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: e1000/e1000e: Fix leak in DMA error cleanup If an error is encountered while mapping TX buffers, the driver should unmap any buffers already mapped for that skb. Because count is incremented after a successful mapping, it will always match the correct number of unmappings needed when dma_error is reached. Decrementing count before the while loop in dma_error causes an off-by-one error. If any mapping was successful before an unsuccessful mapping, exactly one DMA mapping would leak. In these commits, a faulty while condition caused an infinite loop in dma_error: Commit 03b1320dfcee ("e1000e: remove use of skb_dma_map from e1000e driver") Commit 602c0554d7b0 ("e1000: remove use of skb_dma_map from e1000 driver") Commit c1fa347f20f1 ("e1000/e1000e/igb/igbvf/ixgb/ixgbe: Fix tests of unsigned in *_tx_map()") fixed the infinite loop, but introduced the off-by-one error. This issue may still exist in the igbvf driver, but I did not address it in this patch.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0606c24a745bafd1be5d66c48361638cd9cad74b kernel.org
https://git.kernel.org/stable/c/0a1fc25deabab4efce64610e3c449485c4fa8f5f kernel.org
https://git.kernel.org/stable/c/10b5e65959e955a1c8894e0a5413944b5a70204a kernel.org
https://git.kernel.org/stable/c/30e87ade8d678c25a8546cf38c0b498fa5cb27d3 kernel.org
https://git.kernel.org/stable/c/519051c711dfd239ef6e4b28878efee400a035f9 kernel.org
https://git.kernel.org/stable/c/7eaeb778bfaa3b2a804f89321c234d59c74569db kernel.org
https://git.kernel.org/stable/c/e94eaef11142b01f77bf8ba4d0b59720b7858109 kernel.org
https://git.kernel.org/stable/c/fa5ba9867a55e640df0dc79bf0199770fb043f03 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-43445
NVD Published Date:
05/08/2026
NVD Last Modified:
05/08/2026
Source:
kernel.org