CVE-2026-31501
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-416
Utilización después de liberación
Fecha de publicación:
22/04/2026
Última modificación:
28/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path<br />
<br />
cppi5_hdesc_get_psdata() returns a pointer into the CPPI descriptor.<br />
In both emac_rx_packet() and emac_rx_packet_zc(), the descriptor is<br />
freed via k3_cppi_desc_pool_free() before the psdata pointer is used<br />
by emac_rx_timestamp(), which dereferences psdata[0] and psdata[1].<br />
This constitutes a use-after-free on every received packet that goes<br />
through the timestamp path.<br />
<br />
Defer the descriptor free until after all accesses through the psdata<br />
pointer are complete. For emac_rx_packet(), move the free into the<br />
requeue label so both early-exit and success paths free the descriptor<br />
after all accesses are done. For emac_rx_packet_zc(), move the free to<br />
the end of the loop body after emac_dispatch_skb_zc() (which calls<br />
emac_rx_timestamp()) has returned.
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15.1 (incluyendo) | 6.19.11 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.15:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



