CVE-2026-31436
Received Received - Intake
Use-After-Free in Linux dmaengine idxd Causes Descriptor Corruption

Publication date: 2026-04-22

Last updated on: 2026-04-27

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() At the end of this function, d is the traversal cursor of flist, but the code completes found instead. This can lead to issues such as NULL pointer dereferences, double completion, or descriptor leaks. Fix this by completing d instead of found in the final list_for_each_entry_safe() loop.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for the dmaengine idxd issue in the llist_abort_desc() function.

The fix involves correcting the completion of descriptors to prevent NULL pointer dereferences, double completions, or descriptor leaks.

Applying the latest kernel patches or upgrading to the latest stable kernel release is recommended.


Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's dmaengine idxd component, specifically in the function llist_abort_desc(). The issue arises because at the end of this function, the code incorrectly completes a descriptor referred to as 'found' instead of the correct traversal cursor 'd' of the flist. This mistake can cause problems such as NULL pointer dereferences, double completion of descriptors, or descriptor leaks.


How can this vulnerability impact me? :

The vulnerability can lead to serious issues within the Linux kernel's dmaengine idxd subsystem. Specifically, it may cause NULL pointer dereferences, which can crash the system or cause instability. Double completion of descriptors might lead to unexpected behavior or corruption, and descriptor leaks could result in resource exhaustion or degraded performance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart