Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
4025 articles · 143446 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-31691PATCHED
intel · igb

igb: remove napi_synchronize() in igb_down()

Description

In the Linux kernel, the following vulnerability has been resolved: igb: remove napi_synchronize() in igb_down() When an AF_XDP zero-copy application terminates abruptly (e.g., kill -9), the XSK buffer pool is destroyed but NAPI polling continues. igb_clean_rx_irq_zc() repeatedly returns the full budget, preventing napi_complete_done() from clearing NAPI_STATE_SCHED. igb_down() calls napi_synchronize() before napi_disable() for each queue vector. napi_synchronize() spins waiting for NAPI_STATE_SCHED to clear, which never happens. igb_down() blocks indefinitely, the TX watchdog fires, and the TX queue remains permanently stalled. napi_disable() already handles this correctly: it sets NAPI_STATE_DISABLE. After a full-budget poll, __napi_poll() checks napi_disable_pending(). If set, it forces completion and clears NAPI_STATE_SCHED, breaking the loop that napi_synchronize() cannot. napi_synchronize() was added in commit 41f149a285da ("igb: Fix possible panic caused by Rx traffic arrival while interface is down"). napi_disable() provides stronger guarantees: it prevents further scheduling and waits for any active poll to exit. Other Intel drivers (ixgbe, ice, i40e) use napi_disable() without a preceding napi_synchronize() in their down paths. Remove redundant napi_synchronize() call and reorder napi_disable() before igb_set_queue_napi() so the queue-to-NAPI mapping is only cleared after polling has fully stopped.

Affected Products

VendorProductVersions
inteligb2c6196013f84651772388a86dfd4bb033d0c0d45, 2c6196013f84651772388a86dfd4bb033d0c0d45, 2c6196013f84651772388a86dfd4bb033d0c0d45, 6.14, 6.18.22, 6.19.12

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/4700471775746058c962ded6e659bf908fd76e13
  • https://git.kernel.org/stable/c/27f5997686ee7fb7ac01be72b2010f168a3409fc
  • https://git.kernel.org/stable/c/b1e067240379f950a0022208e0685f3465c211cb

Related News (3 articles)

Tier B
BSI Advisories14d ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB15d ago
CVE-2026-31691 | Linux Kernel up to 6.18.22/6.19.12 igb napi_synchronize infinite loop
→ No new info (linked only)
Tier C
Linux Kernel CVEs15d ago
CVE-2026-31691: igb: remove napi_synchronize() in igb_down()
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
4700471775746058c962ded6e659bf908fd76e1327f5997686ee7fb7ac01be72b2010f168a3409fcb1e067240379f950a0022208e0685f3465c211cb06.18.236.19.137.0
PublishedApr 27, 2026
Last enriched15d agov2
Trending Score7
Source articles3
Independent3
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

NONECVE-2025-35969
CVE-2025-35969: Uncontrolled search path for some Intel(R) Server Firmware Update Utility Software before version 16.0.12. within Ring 3
Trending: 25
HIGHCVE-2026-43120
RDMA/irdma: Fix double free related to rereg_user_mr
Trending: 20
NONECVE-2025-35991
CVE-2025-35991: Improper initialization in the UEFI firmware for some Intel platforms within Ring 0: Bare Metal OS may allow an informat
Trending: 20
PRE-CVE
Multiple Vulnerabilities in Intel Software Products
Trending: 20
HIGHCVE-2026-31779
wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler()
Trending: 15

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 27, 2026
Discovered by ZDM
Apr 27, 2026
Patch Available
Apr 27, 2026
Updated: affectedVersions
Apr 27, 2026

Version History

v2
Last enriched 15d ago
v2Tier C15d ago

Updated description with critical vulnerability details, added affected versions 6.18.22 and 6.19.12, and changed severity to CRITICAL.

affectedVersions
via VulDB
v115d ago

Initial creation