CVE-2026-31563
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
27/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: macb: Use dev_consume_skb_any() to free TX SKBs<br />
<br />
The napi_consume_skb() function is not intended to be called in an IRQ<br />
disabled context. However, after commit 6bc8a5098bf4 ("net: macb: Fix<br />
tx_ptr_lock locking"), the freeing of TX SKBs is performed with IRQs<br />
disabled. To resolve the following call trace, use dev_consume_skb_any()<br />
for freeing TX SKBs:<br />
WARNING: kernel/softirq.c:430 at __local_bh_enable_ip+0x174/0x188, CPU#0: ksoftirqd/0/15<br />
Modules linked in:<br />
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 7.0.0-rc4-next-20260319-yocto-standard-dirty #37 PREEMPT<br />
Hardware name: ZynqMP ZCU102 Rev1.1 (DT)<br />
pstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
pc : __local_bh_enable_ip+0x174/0x188<br />
lr : local_bh_enable+0x24/0x38<br />
sp : ffff800082b3bb10<br />
x29: ffff800082b3bb10 x28: ffff0008031f3c00 x27: 000000000011ede0<br />
x26: ffff000800a7ff00 x25: ffff800083937ce8 x24: 0000000000017a80<br />
x23: ffff000803243a78 x22: 0000000000000040 x21: 0000000000000000<br />
x20: ffff000800394c80 x19: 0000000000000200 x18: 0000000000000001<br />
x17: 0000000000000001 x16: ffff000803240000 x15: 0000000000000000<br />
x14: ffffffffffffffff x13: 0000000000000028 x12: ffff000800395650<br />
x11: ffff8000821d1528 x10: ffff800081c2bc08 x9 : ffff800081c1e258<br />
x8 : 0000000100000301 x7 : ffff8000810426ec x6 : 0000000000000000<br />
x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000<br />
x2 : 0000000000000008 x1 : 0000000000000200 x0 : ffff8000810428dc<br />
Call trace:<br />
__local_bh_enable_ip+0x174/0x188 (P)<br />
local_bh_enable+0x24/0x38<br />
skb_attempt_defer_free+0x190/0x1d8<br />
napi_consume_skb+0x58/0x108<br />
macb_tx_poll+0x1a4/0x558<br />
__napi_poll+0x50/0x198<br />
net_rx_action+0x1f4/0x3d8<br />
handle_softirqs+0x16c/0x560<br />
run_ksoftirqd+0x44/0x80<br />
smpboot_thread_fn+0x1d8/0x338<br />
kthread+0x120/0x150<br />
ret_from_fork+0x10/0x20<br />
irq event stamp: 29751<br />
hardirqs last enabled at (29750): [] _raw_spin_unlock_irqrestore+0x44/0x88<br />
hardirqs last disabled at (29751): [] _raw_spin_lock_irqsave+0x38/0x98<br />
softirqs last enabled at (29150): [] handle_softirqs+0x504/0x560<br />
softirqs last disabled at (29153): [] run_ksoftirqd+0x44/0x80
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.151 (incluyendo) | 6.1.168 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.105 (incluyendo) | 6.6.131 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.46 (incluyendo) | 6.12.80 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16.6 (incluyendo) | 6.17 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.17.1 (incluyendo) | 6.18.21 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.11 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.17:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/647b8a2fe474474704110db6bd07f7a139e621eb
- https://git.kernel.org/stable/c/78c8b090a3d5c1689dc989861b0163180db2b3f8
- https://git.kernel.org/stable/c/92e7081f0c79d9073087e54bab745bb184192c2e
- https://git.kernel.org/stable/c/984350b37372f79f71d4f0a5264c640e40daf9ce
- https://git.kernel.org/stable/c/ca4d05afb4683d685bb2c6fccae4386c478f524a
- https://git.kernel.org/stable/c/f4bc91398b579730284328322365afa77a9d568f



