CVE-2026-31523
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
22/04/2026
Última modificación:
22/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nvme-pci: ensure we&#39;re polling a polled queue<br />
<br />
A user can change the polled queue count at run time. There&#39;s a brief<br />
window during a reset where a hipri task may try to poll that queue<br />
before the block layer has updated the queue maps, which would race with<br />
the now interrupt driven queue and may cause double completions.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0685dd9cb855ab77fcf3577b4702ba1d6df1c98d
- https://git.kernel.org/stable/c/166e31d7dbf6aa44829b98aa446bda5c9580f12a
- https://git.kernel.org/stable/c/6f12734c4b619f923a4df0b1a46b8098b187d324
- https://git.kernel.org/stable/c/965e2c943f065122f14282a88d70a8a92e12a4da
- https://git.kernel.org/stable/c/acbc72dd1a09df53cafcf577259f4678be6afd6d
- https://git.kernel.org/stable/c/b222680ba55e018426c4535067a008f1d81a5d21
- https://git.kernel.org/stable/c/b96c7b25eb1b748f3e3b1832ebf028b0b223d7e3
- https://git.kernel.org/stable/c/ba167d5982e2eb6ff9356d409eca592ce99555da



