Description
In the Linux kernel, the following vulnerability has been resolved:

net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()

page_pool_create() can return an ERR_PTR on failure. The return value
is used unconditionally in the loop that follows, passing the error
pointer through xdp_rxq_info_reg_mem_model() into page_pool_use_xdp_mem(),
which dereferences it, causing a kernel oops.

Add an IS_ERR check after page_pool_create() to return early on failure.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via kernel crash
Action: Patch
AI Analysis

Impact

The LAN966X network driver contains a flaw where a page pool creation failure is not properly handled. The code uses the error pointer returned by page_pool_create without an IS_ERR check, and later dereferences it during XDP memory setup. This NULL pointer dereference (CWE-476) triggers a kernel oops and a system crash, resulting in denial of service.

Affected Systems

All Linux kernel releases that include the LAN966X driver are vulnerable. According to the affected platform enumeration, versions 6.2 and all 7.0 release candidates (RC1 through RC7) are impacted until updated with the patch that introduces error handling after page_pool_create. The vulnerability applies to any system running a Linux kernel that includes the LAN966X driver.

Risk and Exploitability

The CVSS score of 5.5 reflects a moderate impact mainly in terms of availability. The EPSS score of <1% indicates a very low expected exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local or privileged access capable of sending malicious network traffic or otherwise triggering the driver’s memory allocation routine. Because the flaw requires a failure of page_pool_create – an event that is typically associated with low memory conditions – it is not trivially exploitable, but it can be triggered in constrained environments or by carefully crafted packets. Overall, the risk is moderate but exploitation is unlikely under normal operating conditions.

Generated by OpenCVE AI on April 28, 2026 at 13:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that includes the lan966x_fdma_rx_alloc_page_pool patch to ensure proper error handling after page_pool_create.
  • If a kernel update cannot be applied immediately, consider disabling the lan966x NIC or switching to an alternate network driver to avoid using the vulnerable code.
  • Continuously monitor system logs for kernel oops messages and apply the patch as soon as it becomes available to prevent a denial‑of‑service event.

Generated by OpenCVE AI on April 28, 2026 at 13:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
CPEs cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() page_pool_create() can return an ERR_PTR on failure. The return value is used unconditionally in the loop that follows, passing the error pointer through xdp_rxq_info_reg_mem_model() into page_pool_use_xdp_mem(), which dereferences it, causing a kernel oops. Add an IS_ERR check after page_pool_create() to return early on failure.
Title net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:50.586Z

Reserved: 2026-03-09T15:48:24.127Z

Link: CVE-2026-31646

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:43.967

Modified: 2026-04-27T20:19:01.043

Link: CVE-2026-31646

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31646 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:00:16Z

Weaknesses