U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31737 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix ring allocation unwind on open failure ftgmac100_alloc_rings() allocates rx_skbs, tx_skbs, rxdes, txdes, and rx_scratch in stages. On intermediate failures it returned -ENOMEM directly, leaking resources allocated earlier in the function. Rework the failure path to use staged local unwind labels and free allocated resources in reverse order before returning -ENOMEM. This matches common netdev allocation cleanup style.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/184b3a500d60ea48d1b176103cff1706c456edf3 kernel.org Patch 
https://git.kernel.org/stable/c/78da43320d9d6ed788147fb085184e4fc801f057 kernel.org Patch 
https://git.kernel.org/stable/c/82f86111f0704ab2ded11a2033bc6cf0be3e09ea kernel.org Patch 
https://git.kernel.org/stable/c/8351d18989c8642fc53e2e12d94e42314a39b078 kernel.org Patch 
https://git.kernel.org/stable/c/8a71911fc7eeea930153322bc1efc065db8cd97e kernel.org Patch 
https://git.kernel.org/stable/c/a7e1bf392acf11dc4209820fef75758f6e42bd65 kernel.org Patch 
https://git.kernel.org/stable/c/c0fd0fe745f5e8c568d898cd1513d0083e46204a kernel.org Patch 
https://git.kernel.org/stable/c/d45230081f19c280096241353c26b0de457de795 kernel.org Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-noinfo Insufficient Information cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31737
NVD Published Date:
05/01/2026
NVD Last Modified:
05/07/2026
Source:
kernel.org