CVE-2026-31594
Błąd w jądrze Linuxa w pci-epf-vntb prowadzi do awarii systemu przy błędach linku.
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown epf_ntb_epc_destroy() duplicates the teardown that the caller is supposed to perform later. This leads to an oops when .allow_link fails or when .drop_link is performed. The following is an example oops of the former case: Unable to handle kernel paging request at virtual address dead000000000108 [...] [dead000000000108] address between user and kernel address ranges Internal error: Oops: 0000000096000044 [#1] SMP [...] Call trace: pci_epc_remove_epf+0x78/0xe0 (P) pci_primary_epc_epf_link+0x88/0xa8 configfs_symlink+0x1f4/0x5a0 vfs_symlink+0x134/0x1d8 do_symlinkat+0x88/0x138 __arm64_sys_symlinkat+0x74/0xe0 [...] Remove the helper, and drop pci_epc_put(). EPC device refcounting is tied to the configfs EPC group lifetime, and pci_epc_put() in the .drop_link path is sufficient.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 5.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-24 15:16:37 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 14:27:14 UTC |
- https://git.kernel.org/stable/c/0da63230d3ec1ec5fcc443a2314233e95bfece54 (416baaa9-dc9f-4396-8d5f-8c081fb06d67) [Patch]
- https://git.kernel.org/stable/c/478e776101592eb63298714e96823ef78a3295ec (416baaa9-dc9f-4396-8d5f-8c081fb06d67) [Patch]
- https://git.kernel.org/stable/c/73bf218de28d039126dc64281d2b47dd3c46a0a3 (416baaa9-dc9f-4396-8d5f-8c081fb06d67) [Patch]
- https://git.kernel.org/stable/c/a7a3cab4d33fd8a8aed864c447d0d7c99e85404e (416baaa9-dc9f-4396-8d5f-8c081fb06d67) [Patch]
- https://git.kernel.org/stable/c/cec9ead73ab154a7953f6ab8dd5127e0d6bbf95a (416baaa9-dc9f-4396-8d5f-8c081fb06d67) [Patch]
- https://git.kernel.org/stable/c/e238ab12556b00f3b4d8b870b32ba1e4f4d4ebc2 (416baaa9-dc9f-4396-8d5f-8c081fb06d67) [Patch]