CVE-2026-31563

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
27/04/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: macb: Use dev_consume_skb_any() to free TX SKBs<br /> <br /> The napi_consume_skb() function is not intended to be called in an IRQ<br /> disabled context. However, after commit 6bc8a5098bf4 ("net: macb: Fix<br /> tx_ptr_lock locking"), the freeing of TX SKBs is performed with IRQs<br /> disabled. To resolve the following call trace, use dev_consume_skb_any()<br /> for freeing TX SKBs:<br /> WARNING: kernel/softirq.c:430 at __local_bh_enable_ip+0x174/0x188, CPU#0: ksoftirqd/0/15<br /> Modules linked in:<br /> CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 7.0.0-rc4-next-20260319-yocto-standard-dirty #37 PREEMPT<br /> Hardware name: ZynqMP ZCU102 Rev1.1 (DT)<br /> pstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : __local_bh_enable_ip+0x174/0x188<br /> lr : local_bh_enable+0x24/0x38<br /> sp : ffff800082b3bb10<br /> x29: ffff800082b3bb10 x28: ffff0008031f3c00 x27: 000000000011ede0<br /> x26: ffff000800a7ff00 x25: ffff800083937ce8 x24: 0000000000017a80<br /> x23: ffff000803243a78 x22: 0000000000000040 x21: 0000000000000000<br /> x20: ffff000800394c80 x19: 0000000000000200 x18: 0000000000000001<br /> x17: 0000000000000001 x16: ffff000803240000 x15: 0000000000000000<br /> x14: ffffffffffffffff x13: 0000000000000028 x12: ffff000800395650<br /> x11: ffff8000821d1528 x10: ffff800081c2bc08 x9 : ffff800081c1e258<br /> x8 : 0000000100000301 x7 : ffff8000810426ec x6 : 0000000000000000<br /> x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000<br /> x2 : 0000000000000008 x1 : 0000000000000200 x0 : ffff8000810428dc<br /> Call trace:<br /> __local_bh_enable_ip+0x174/0x188 (P)<br /> local_bh_enable+0x24/0x38<br /> skb_attempt_defer_free+0x190/0x1d8<br /> napi_consume_skb+0x58/0x108<br /> macb_tx_poll+0x1a4/0x558<br /> __napi_poll+0x50/0x198<br /> net_rx_action+0x1f4/0x3d8<br /> handle_softirqs+0x16c/0x560<br /> run_ksoftirqd+0x44/0x80<br /> smpboot_thread_fn+0x1d8/0x338<br /> kthread+0x120/0x150<br /> ret_from_fork+0x10/0x20<br /> irq event stamp: 29751<br /> hardirqs last enabled at (29750): [] _raw_spin_unlock_irqrestore+0x44/0x88<br /> hardirqs last disabled at (29751): [] _raw_spin_lock_irqsave+0x38/0x98<br /> softirqs last enabled at (29150): [] handle_softirqs+0x504/0x560<br /> softirqs last disabled at (29153): [] run_ksoftirqd+0x44/0x80

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.151 (including) 6.1.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.105 (including) 6.6.131 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12.46 (including) 6.12.80 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.16.6 (including) 6.17 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.17.1 (including) 6.18.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.11 (excluding)
cpe:2.3:o:linux:linux_kernel:6.17:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*