CVE-2026-31420
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/04/2026
Última modificación:
13/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bridge: mrp: reject zero test interval to avoid OOM panic<br />
<br />
br_mrp_start_test() and br_mrp_start_in_test() accept the user-supplied<br />
interval value from netlink without validation. When interval is 0,<br />
usecs_to_jiffies(0) yields 0, causing the delayed work<br />
(br_mrp_test_work_expired / br_mrp_in_test_work_expired) to reschedule<br />
itself with zero delay. This creates a tight loop on system_percpu_wq<br />
that allocates and transmits MRP test frames at maximum rate, exhausting<br />
all system memory and causing a kernel panic via OOM deadlock.<br />
<br />
The same zero-interval issue applies to br_mrp_start_in_test_parse()<br />
for interconnect test frames.<br />
<br />
Use NLA_POLICY_MIN(NLA_U32, 1) in the nla_policy tables for both<br />
IFLA_BRIDGE_MRP_START_TEST_INTERVAL and<br />
IFLA_BRIDGE_MRP_START_IN_TEST_INTERVAL, so zero is rejected at the<br />
netlink attribute parsing layer before the value ever reaches the<br />
workqueue scheduling code. This is consistent with how other bridge<br />
subsystems (br_fdb, br_mst) enforce range constraints on netlink<br />
attributes.



