CVE-2026-31678
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
25/04/2026
Última modificación:
25/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
openvswitch: defer tunnel netdev_put to RCU release<br />
<br />
ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already<br />
detached the device. Dropping the netdev reference in destroy can race<br />
with concurrent readers that still observe vport->dev.<br />
<br />
Do not release vport->dev in ovs_netdev_tunnel_destroy(). Instead, let<br />
vport_netdev_free() drop the reference from the RCU callback, matching<br />
the non-tunnel destroy path and avoiding additional synchronization<br />
under RTNL.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/42f0d3d81209654c08ffdde5a34b9b92d2645896
- https://git.kernel.org/stable/c/6931d21f87bc6d657f145798fad0bf077b82486c
- https://git.kernel.org/stable/c/98b726ab5e2a4811e27c28e4d041f75bba147eab
- https://git.kernel.org/stable/c/9d56aced21fb9c104e8a3f3be9b21fbafe448ffc
- https://git.kernel.org/stable/c/b8c56a3fc5d879c0928f207a756b0f067f06c6a8
- https://git.kernel.org/stable/c/bbe7bd722bfaea36aab3da6cc60fb4a05c644643



