CVE-2026-31492

In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Initialize free_qp completion before using it In irdma_create_qp, if ib_copy_to_udata fails, it will call irdma_destroy_qp to clean up which will attempt to wait on the free_qp completion, which is not initialized yet. Fix this by initializing the completion before the ib_copy_to_udata call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

28 Apr 2026, 12:46

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
CWE CWE-908
References () https://git.kernel.org/stable/c/11a95521fb93c91e2d4ef9d53dc80ef0a755549b - () https://git.kernel.org/stable/c/11a95521fb93c91e2d4ef9d53dc80ef0a755549b - Patch
References () https://git.kernel.org/stable/c/3cb88c12461b71c7d9c604aa2e6a9a477ecfa147 - () https://git.kernel.org/stable/c/3cb88c12461b71c7d9c604aa2e6a9a477ecfa147 - Patch
References () https://git.kernel.org/stable/c/ac1da7bd224d406b6f1b84414f0f652ab43b6bd8 - () https://git.kernel.org/stable/c/ac1da7bd224d406b6f1b84414f0f652ab43b6bd8 - Patch
References () https://git.kernel.org/stable/c/af310407f79d5816fc0ab3638e1588b6193316dd - () https://git.kernel.org/stable/c/af310407f79d5816fc0ab3638e1588b6193316dd - Patch
References () https://git.kernel.org/stable/c/cd1534c8f4984432382c240f6784408497f5bb0a - () https://git.kernel.org/stable/c/cd1534c8f4984432382c240f6784408497f5bb0a - Patch
References () https://git.kernel.org/stable/c/f72996834f7bdefc2b95e3eec30447ee195df44e - () https://git.kernel.org/stable/c/f72996834f7bdefc2b95e3eec30447ee195df44e - Patch

22 Apr 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-22 14:16

Updated : 2026-04-28 12:46


NVD link : CVE-2026-31492

Mitre link : CVE-2026-31492

CVE.ORG link : CVE-2026-31492


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource