CVE-2026-31492
Published: April 23, 2026Last modified: April 23, 2026
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Initialize free_qp completion before using it In irdma_create_qp, if ib_copy_to_udata fails, it will call irdma_destroy_qp to clean up which will attempt to wait on the free_qp completion, which is not initialized yet. Fix this by initializing the completion before the ib_copy_to_udata call.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.5 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.168-r0) |
| 25 LTS | linux-lts | Fixed (6.12.80-r0) | |
| Stream | linux-lts | Fixed (6.12.80-r0) |
References
- https://git.kernel.org/stable/c/11a95521fb93c91e2d4ef9d53dc80ef0a755549b
- https://git.kernel.org/stable/c/3cb88c12461b71c7d9c604aa2e6a9a477ecfa147
- https://git.kernel.org/stable/c/ac1da7bd224d406b6f1b84414f0f652ab43b6bd8
- https://git.kernel.org/stable/c/af310407f79d5816fc0ab3638e1588b6193316dd
- https://git.kernel.org/stable/c/cd1534c8f4984432382c240f6784408497f5bb0a
- https://git.kernel.org/stable/c/f72996834f7bdefc2b95e3eec30447ee195df44e