CVE-2026-31646

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() page_pool_create() can return an ERR_PTR on failure. The return value is used unconditionally in the loop that follows, passing the error pointer through xdp_rxq_info_reg_mem_model() into page_pool_use_xdp_mem(), which dereferences it, causing a kernel oops. Add an IS_ERR check after page_pool_create() to return early on failure.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

27 Apr 2026, 20:19

Type Values Removed Values Added
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/305832c53551cfbe6e5b81ca7ee765e60f4fe8e9 - () https://git.kernel.org/stable/c/305832c53551cfbe6e5b81ca7ee765e60f4fe8e9 - Patch
References () https://git.kernel.org/stable/c/3fd0da4fd8851a7e62d009b7db6c4a05b092bc19 - () https://git.kernel.org/stable/c/3fd0da4fd8851a7e62d009b7db6c4a05b092bc19 - Patch
References () https://git.kernel.org/stable/c/7caf90d9ab97951a58d1de85ab7e7d7cca7a4513 - () https://git.kernel.org/stable/c/7caf90d9ab97951a58d1de85ab7e7d7cca7a4513 - Patch
References () https://git.kernel.org/stable/c/b5dcb41ba891b55157006cac79825c78a32b409e - () https://git.kernel.org/stable/c/b5dcb41ba891b55157006cac79825c78a32b409e - Patch
References () https://git.kernel.org/stable/c/e63265f188ea39dcf5f546770650027528f3bd0f - () https://git.kernel.org/stable/c/e63265f188ea39dcf5f546770650027528f3bd0f - Patch

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-27 20:19


NVD link : CVE-2026-31646

Mitre link : CVE-2026-31646

CVE.ORG link : CVE-2026-31646


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference