{
  "public_date" : "2026-04-24T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: net: macb: Use dev_consume_skb_any() to free TX SKBs",
    "id" : "2461479",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2461479"
  },
  "cwe" : "CWE-821",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nnet: macb: Use dev_consume_skb_any() to free TX SKBs\nThe napi_consume_skb() function is not intended to be called in an IRQ\ndisabled context. However, after commit 6bc8a5098bf4 (\"net: macb: Fix\ntx_ptr_lock locking\"), the freeing of TX SKBs is performed with IRQs\ndisabled. To resolve the following call trace, use dev_consume_skb_any()\nfor freeing TX SKBs:\nWARNING: kernel/softirq.c:430 at __local_bh_enable_ip+0x174/0x188, CPU#0: ksoftirqd/0/15\nModules linked in:\nCPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 7.0.0-rc4-next-20260319-yocto-standard-dirty #37 PREEMPT\nHardware name: ZynqMP ZCU102 Rev1.1 (DT)\npstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __local_bh_enable_ip+0x174/0x188\nlr : local_bh_enable+0x24/0x38\nsp : ffff800082b3bb10\nx29: ffff800082b3bb10 x28: ffff0008031f3c00 x27: 000000000011ede0\nx26: ffff000800a7ff00 x25: ffff800083937ce8 x24: 0000000000017a80\nx23: ffff000803243a78 x22: 0000000000000040 x21: 0000000000000000\nx20: ffff000800394c80 x19: 0000000000000200 x18: 0000000000000001\nx17: 0000000000000001 x16: ffff000803240000 x15: 0000000000000000\nx14: ffffffffffffffff x13: 0000000000000028 x12: ffff000800395650\nx11: ffff8000821d1528 x10: ffff800081c2bc08 x9 : ffff800081c1e258\nx8 : 0000000100000301 x7 : ffff8000810426ec x6 : 0000000000000000\nx5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : 0000000000000008 x1 : 0000000000000200 x0 : ffff8000810428dc\nCall trace:\n__local_bh_enable_ip+0x174/0x188 (P)\nlocal_bh_enable+0x24/0x38\nskb_attempt_defer_free+0x190/0x1d8\nnapi_consume_skb+0x58/0x108\nmacb_tx_poll+0x1a4/0x558\n__napi_poll+0x50/0x198\nnet_rx_action+0x1f4/0x3d8\nhandle_softirqs+0x16c/0x560\nrun_ksoftirqd+0x44/0x80\nsmpboot_thread_fn+0x1d8/0x338\nkthread+0x120/0x150\nret_from_fork+0x10/0x20\nirq event stamp: 29751\nhardirqs last  enabled at (29750): [<ffff8000813be184>] _raw_spin_unlock_irqrestore+0x44/0x88\nhardirqs last disabled at (29751): [<ffff8000813bdf60>] _raw_spin_lock_irqsave+0x38/0x98\nsoftirqs last  enabled at (29150): [<ffff8000800f1aec>] handle_softirqs+0x504/0x560\nsoftirqs last disabled at (29153): [<ffff8000800f2fec>] run_ksoftirqd+0x44/0x80", "A flaw was found in the Linux kernel's macb Ethernet driver. The `napi_consume_skb()` function, which is used for freeing network packet buffers (SKBs), was incorrectly called in an interrupt-disabled context. This improper handling of network packet freeing can lead to a kernel warning and system instability, potentially causing a denial of service." ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-31563\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-31563\nhttps://lore.kernel.org/linux-cve-announce/2026042459-CVE-2026-31563-ae94@gregkh/T" ],
  "name" : "CVE-2026-31563",
  "csaw" : false
}