Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bnge: return after auxiliary_device_uninit() in error path When auxiliary_device_add() fails, the error block calls auxiliary_device_uninit() but does not return. The uninit drops the last reference and synchronously runs bnge_aux_dev_release(), which sets bd->auxr_dev = NULL and frees the underlying object. The subsequent bd->auxr_dev->net = bd->netdev then dereferences NULL, which is not a good thing to have happen when trying to clean up from an error. Add the missing return, as the auxiliary bus documentation states is a requirement (seems that LLM tools read documentation better than humans do...)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.19, < 6.19.14 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/38c383ec6d37f4b5597f8e6a1f5c2ab31ea01d3aPatch
- https://git.kernel.org/stable/c/87bc3557c708110d83086bf091328271298a44e3Patch
- https://git.kernel.org/stable/c/8b0c25528cb64f71a73b5c0d49cbbcb68540a4cePatch
FAQ
What is CVE-2026-31621?
CVE-2026-31621 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: bnge: return after auxiliary_device_uninit() in error path When auxiliary_device_add() fails, the error block calls auxiliary_devi...
How severe is CVE-2026-31621?
CVE-2026-31621 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31621?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.