Description
In the Linux kernel, the following vulnerability has been resolved:

net: ftgmac100: fix ring allocation unwind on open failure

ftgmac100_alloc_rings() allocates rx_skbs, tx_skbs, rxdes, txdes, and
rx_scratch in stages. On intermediate failures it returned -ENOMEM
directly, leaking resources allocated earlier in the function.

Rework the failure path to use staged local unwind labels and free
allocated resources in reverse order before returning -ENOMEM. This
matches common netdev allocation cleanup style.
Published: 2026-05-01
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In Linux kernel's ftgmac100 network driver, ring allocation routine could leak memory when opening the device fails. The driver allocates several resources—rx_skbs, tx_skbs, rxdes, txdes, and rx_scratch—in stages. On intermediate failures, the function returned -ENOMEM without freeing previously allocated memory, leading to a resource leak (CWE‑401). This leak can grow with repeated failures, potentially exhausting kernel memory and causing a denial of service.

Affected Systems

The vulnerability affects the ftgmac100 driver in the Linux kernel, which is used in devices that provide an Ethernet interface via the FTG MAC100 hardware. Any system running a kernel version that contains the unpatched ftgmac100 implementation, regardless of vendor, is potentially impacted. The precise version range is not specified but the fault was addressed in a commit that updates the kernel source.

Risk and Exploitability

The CVSS score is not provided and the EPSS score is unavailable, so an exact severity rating cannot be given. However, the criticality stems from the possibility of gradual memory exhaustion if an attacker can repeatedly trigger the faulty open path. Since the flaw is in the kernel driver, local or privileged users who can force the device to open or unload the driver have the most direct means to exploit it. Because the issue is a resource leak rather than an immediate privilege escalation or code execution, the risk is more about availability than confidentiality or integrity. The vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known exploits yet.

Generated by OpenCVE AI on May 2, 2026 at 07:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the commit fixing the ftgmac100 ring allocation unwind logic; the relevant commit hashes are listed in the advisory links.
  • If a kernel upgrade cannot be performed immediately, disable or isolate the ftgmac100 network interface so that the open path that triggers the allocation is not exercised.
  • Monitor kernel memory usage on systems that use the ftgmac100 driver, watching for abnormal growth in memory consumed by network drivers and consider applying memory limits or constraints.

Generated by OpenCVE AI on May 2, 2026 at 07:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix ring allocation unwind on open failure ftgmac100_alloc_rings() allocates rx_skbs, tx_skbs, rxdes, txdes, and rx_scratch in stages. On intermediate failures it returned -ENOMEM directly, leaking resources allocated earlier in the function. Rework the failure path to use staged local unwind labels and free allocated resources in reverse order before returning -ENOMEM. This matches common netdev allocation cleanup style.
Title net: ftgmac100: fix ring allocation unwind on open failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:34.229Z

Reserved: 2026-03-09T15:48:24.137Z

Link: CVE-2026-31737

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:36.347

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31737

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31737 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:45:37Z

Weaknesses