CVE-2026-31510
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-476
Desreferencia a puntero nulo (NULL)
Fecha de publicación:
22/04/2026
Última modificación:
28/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb<br />
<br />
Before using sk pointer, check if it is null.<br />
<br />
Fix the following:<br />
<br />
KASAN: null-ptr-deref in range [0x0000000000000260-0x0000000000000267]<br />
CPU: 0 UID: 0 PID: 5985 Comm: kworker/0:5 Not tainted 7.0.0-rc4-00029-ga989fde763f4 #1 PREEMPT(full)<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-9.fc43 06/10/2025<br />
Workqueue: events l2cap_info_timeout<br />
RIP: 0010:kasan_byte_accessible+0x12/0x30<br />
Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df b6 04 07 3c 08 0f 92 c0 c3 cc cce<br />
veth0_macvtap: entered promiscuous mode<br />
RSP: 0018:ffffc90006e0f808 EFLAGS: 00010202<br />
RAX: dffffc0000000000 RBX: ffffffff89746018 RCX: 0000000080000001<br />
RDX: 0000000000000000 RSI: ffffffff89746018 RDI: 000000000000004c<br />
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000<br />
R10: dffffc0000000000 R11: ffffffff8aae3e70 R12: 0000000000000000<br />
R13: 0000000000000260 R14: 0000000000000260 R15: 0000000000000001<br />
FS: 0000000000000000(0000) GS:ffff8880983c2000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 00005582615a5008 CR3: 000000007007e000 CR4: 0000000000752ef0<br />
PKRU: 55555554<br />
Call Trace:<br />
<br />
__kasan_check_byte+0x12/0x40<br />
lock_acquire+0x79/0x2e0<br />
lock_sock_nested+0x48/0x100<br />
? l2cap_sock_ready_cb+0x46/0x160<br />
l2cap_sock_ready_cb+0x46/0x160<br />
l2cap_conn_start+0x779/0xff0<br />
? __pfx_l2cap_conn_start+0x10/0x10<br />
? l2cap_info_timeout+0x60/0xa0<br />
? __pfx___mutex_lock+0x10/0x10<br />
l2cap_info_timeout+0x68/0xa0<br />
? process_scheduled_works+0xa8d/0x18c0<br />
process_scheduled_works+0xb6e/0x18c0<br />
? __pfx_process_scheduled_works+0x10/0x10<br />
? assign_work+0x3d5/0x5e0<br />
worker_thread+0xa53/0xfc0<br />
kthread+0x388/0x470<br />
? __pfx_worker_thread+0x10/0x10<br />
? __pfx_kthread+0x10/0x10<br />
ret_from_fork+0x51e/0xb90<br />
? __pfx_ret_from_fork+0x10/0x10<br />
veth1_macvtap: entered promiscuous mode<br />
? __switch_to+0xc7d/0x1450<br />
? __pfx_kthread+0x10/0x10<br />
ret_from_fork_asm+0x1a/0x30<br />
<br />
Modules linked in:<br />
---[ end trace 0000000000000000 ]---<br />
batman_adv: batadv0: Interface activated: batadv_slave_0<br />
batman_adv: batadv0: Interface activated: batadv_slave_1<br />
netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0<br />
netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0<br />
netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0<br />
netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0<br />
RIP: 0010:kasan_byte_accessible+0x12/0x30<br />
Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df b6 04 07 3c 08 0f 92 c0 c3 cc cce<br />
ieee80211 phy39: Selected rate control algorithm &#39;minstrel_ht&#39;<br />
RSP: 0018:ffffc90006e0f808 EFLAGS: 00010202<br />
RAX: dffffc0000000000 RBX: ffffffff89746018 RCX: 0000000080000001<br />
RDX: 0000000000000000 RSI: ffffffff89746018 RDI: 000000000000004c<br />
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000<br />
R10: dffffc0000000000 R11: ffffffff8aae3e70 R12: 0000000000000000<br />
R13: 0000000000000260 R14: 0000000000000260 R15: 0000000000000001<br />
FS: 0000000000000000(0000) GS:ffff8880983c2000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 00007f7e16139e9c CR3: 000000000e74e000 CR4: 0000000000752ef0<br />
PKRU: 55555554<br />
Kernel panic - not syncing: Fatal exception
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.6.1 (incluyendo) | 5.10.253 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.203 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.168 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.131 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.80 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.21 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.11 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/03d4eafb0f3788239df63575951f6b4c97bbfda4
- https://git.kernel.org/stable/c/0780f9333852971ca77d110019e3a66ce5a7b100
- https://git.kernel.org/stable/c/1dc6db047919ecd59493cd51248b37381bbabcbb
- https://git.kernel.org/stable/c/3c821bc0fbeaa27910a20d0b43c6008d099792af
- https://git.kernel.org/stable/c/898b89c90ff9496e64b9331040778cc4e1b28c9d
- https://git.kernel.org/stable/c/a04a760c06bb591989db659439efdf106f0bae76
- https://git.kernel.org/stable/c/b6552e0503973daf6f23bd6ed9273ef131ee364f
- https://git.kernel.org/stable/c/d34776c7fa1f2c510f1cdd14823aba701babb4ad



