CVE-2026-31493
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
22/04/2026
Última modificación:
22/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/efa: Fix use of completion ctx after free<br />
<br />
On admin queue completion handling, if the admin command completed with<br />
error we print data from the completion context. The issue is that we<br />
already freed the completion context in polling/interrupts handler which<br />
means we print data from context in an unknown state (it might be<br />
already used again).<br />
Change the admin submission flow so alloc/dealloc of the context will be<br />
symmetric and dealloc will be called after any potential use of the<br />
context.



