CVE-2026-31594

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
29/04/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown<br /> <br /> epf_ntb_epc_destroy() duplicates the teardown that the caller is<br /> supposed to perform later. This leads to an oops when .allow_link fails<br /> or when .drop_link is performed. The following is an example oops of the<br /> former case:<br /> <br /> Unable to handle kernel paging request at virtual address dead000000000108<br /> [...]<br /> [dead000000000108] address between user and kernel address ranges<br /> Internal error: Oops: 0000000096000044 [#1] SMP<br /> [...]<br /> Call trace:<br /> pci_epc_remove_epf+0x78/0xe0 (P)<br /> pci_primary_epc_epf_link+0x88/0xa8<br /> configfs_symlink+0x1f4/0x5a0<br /> vfs_symlink+0x134/0x1d8<br /> do_symlinkat+0x88/0x138<br /> __arm64_sys_symlinkat+0x74/0xe0<br /> [...]<br /> <br /> Remove the helper, and drop pci_epc_put(). EPC device refcounting is<br /> tied to the configfs EPC group lifetime, and pci_epc_put() in the<br /> .drop_link path is sufficient.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.6.136 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.84 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 7.0 (including) 7.0.1 (excluding)