CVE-2026-31737 PUBLISHED

net: ftgmac100: fix ring allocation unwind on open failure

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

net: ftgmac100: fix ring allocation unwind on open failure

ftgmac100_alloc_rings() allocates rx_skbs, tx_skbs, rxdes, txdes, and rx_scratch in stages. On intermediate failures it returned -ENOMEM directly, leaking resources allocated earlier in the function.

Rework the failure path to use staged local unwind labels and free allocated resources in reverse order before returning -ENOMEM. This matches common netdev allocation cleanup style.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to 184b3a500d60ea48d1b176103cff1706c456edf3 (excl.)
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to 78da43320d9d6ed788147fb085184e4fc801f057 (excl.)
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to a7e1bf392acf11dc4209820fef75758f6e42bd65 (excl.)
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to 8a71911fc7eeea930153322bc1efc065db8cd97e (excl.)
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to d45230081f19c280096241353c26b0de457de795 (excl.)
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to 8351d18989c8642fc53e2e12d94e42314a39b078 (excl.)
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to 82f86111f0704ab2ded11a2033bc6cf0be3e09ea (excl.)
  • affected from d72e01a0430f8a1ae7adb3cbf0b2e73fcd99252e to c0fd0fe745f5e8c568d898cd1513d0083e46204a (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.12 is affected
  • unaffected from 0 to 4.12 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.168 to 6.1.* (incl.)
  • unaffected from 6.6.134 to 6.6.* (incl.)
  • unaffected from 6.12.81 to 6.12.* (incl.)
  • unaffected from 6.18.22 to 6.18.* (incl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References