CVE-2026-31644 (GCVE-0-2026-31644)
Vulnerability from cvelistv5 – Published: 2026-04-24 14:44 – Updated: 2026-04-24 14:44
VLAI?
Title
net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()
Summary
In the Linux kernel, the following vulnerability has been resolved:
net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()
When lan966x_fdma_reload() fails to allocate new RX buffers, the restore
path restarts DMA using old descriptors whose pages were already freed
via lan966x_fdma_rx_free_pages(). Since page_pool_put_full_page() can
release pages back to the buddy allocator, the hardware may DMA into
memory now owned by other kernel subsystems.
Additionally, on the restore path, the newly created page pool (if
allocation partially succeeded) is overwritten without being destroyed,
leaking it.
Fix both issues by deferring the release of old pages until after the
new allocation succeeds. Save the old page array before the allocation
so old pages can be freed on the success path. On the failure path, the
old descriptors, pages and page pool are all still valid, making the
restore safe. Also ensure the restore path re-enables NAPI and wakes
the netdev, matching the success path.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
89ba464fcf548d64bc7215dfe769f791330ae8b6 , < 691082c0b93c13a5e068c0905f673060bddc204e
(git)
Affected: 89ba464fcf548d64bc7215dfe769f791330ae8b6 , < 92a673019943770930e2a8bfd52e1aad47a1fc1f (git) Affected: 89ba464fcf548d64bc7215dfe769f791330ae8b6 , < 9950e9199b3dfdfbde0b8d96ba947d7b11243801 (git) Affected: 89ba464fcf548d64bc7215dfe769f791330ae8b6 , < 59c3d55a946cacdb4181600723c20ac4f4c20c84 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/microchip/lan966x/lan966x_fdma.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "691082c0b93c13a5e068c0905f673060bddc204e",
"status": "affected",
"version": "89ba464fcf548d64bc7215dfe769f791330ae8b6",
"versionType": "git"
},
{
"lessThan": "92a673019943770930e2a8bfd52e1aad47a1fc1f",
"status": "affected",
"version": "89ba464fcf548d64bc7215dfe769f791330ae8b6",
"versionType": "git"
},
{
"lessThan": "9950e9199b3dfdfbde0b8d96ba947d7b11243801",
"status": "affected",
"version": "89ba464fcf548d64bc7215dfe769f791330ae8b6",
"versionType": "git"
},
{
"lessThan": "59c3d55a946cacdb4181600723c20ac4f4c20c84",
"status": "affected",
"version": "89ba464fcf548d64bc7215dfe769f791330ae8b6",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/microchip/lan966x/lan966x_fdma.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.12"
},
{
"lessThan": "6.12",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.82",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.23",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.13",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.82",
"versionStartIncluding": "6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.23",
"versionStartIncluding": "6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.13",
"versionStartIncluding": "6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "6.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: lan966x: fix use-after-free and leak in lan966x_fdma_reload()\n\nWhen lan966x_fdma_reload() fails to allocate new RX buffers, the restore\npath restarts DMA using old descriptors whose pages were already freed\nvia lan966x_fdma_rx_free_pages(). Since page_pool_put_full_page() can\nrelease pages back to the buddy allocator, the hardware may DMA into\nmemory now owned by other kernel subsystems.\n\nAdditionally, on the restore path, the newly created page pool (if\nallocation partially succeeded) is overwritten without being destroyed,\nleaking it.\n\nFix both issues by deferring the release of old pages until after the\nnew allocation succeeds. Save the old page array before the allocation\nso old pages can be freed on the success path. On the failure path, the\nold descriptors, pages and page pool are all still valid, making the\nrestore safe. Also ensure the restore path re-enables NAPI and wakes\nthe netdev, matching the success path."
}
],
"providerMetadata": {
"dateUpdated": "2026-04-24T14:44:58.197Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/691082c0b93c13a5e068c0905f673060bddc204e"
},
{
"url": "https://git.kernel.org/stable/c/92a673019943770930e2a8bfd52e1aad47a1fc1f"
},
{
"url": "https://git.kernel.org/stable/c/9950e9199b3dfdfbde0b8d96ba947d7b11243801"
},
{
"url": "https://git.kernel.org/stable/c/59c3d55a946cacdb4181600723c20ac4f4c20c84"
}
],
"title": "net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-31644",
"datePublished": "2026-04-24T14:44:58.197Z",
"dateReserved": "2026-03-09T15:48:24.127Z",
"dateUpdated": "2026-04-24T14:44:58.197Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-31644",
"date": "2026-04-25",
"epss": "0.00018",
"percentile": "0.04621"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-31644\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-04-24T15:16:43.770\",\"lastModified\":\"2026-04-24T17:51:40.810\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: lan966x: fix use-after-free and leak in lan966x_fdma_reload()\\n\\nWhen lan966x_fdma_reload() fails to allocate new RX buffers, the restore\\npath restarts DMA using old descriptors whose pages were already freed\\nvia lan966x_fdma_rx_free_pages(). Since page_pool_put_full_page() can\\nrelease pages back to the buddy allocator, the hardware may DMA into\\nmemory now owned by other kernel subsystems.\\n\\nAdditionally, on the restore path, the newly created page pool (if\\nallocation partially succeeded) is overwritten without being destroyed,\\nleaking it.\\n\\nFix both issues by deferring the release of old pages until after the\\nnew allocation succeeds. Save the old page array before the allocation\\nso old pages can be freed on the success path. On the failure path, the\\nold descriptors, pages and page pool are all still valid, making the\\nrestore safe. Also ensure the restore path re-enables NAPI and wakes\\nthe netdev, matching the success path.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/59c3d55a946cacdb4181600723c20ac4f4c20c84\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/691082c0b93c13a5e068c0905f673060bddc204e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/92a673019943770930e2a8bfd52e1aad47a1fc1f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9950e9199b3dfdfbde0b8d96ba947d7b11243801\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…