In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Initialize free_qp completion before using it
In irdma_create_qp, if ib_copy_to_udata fails, it will call
irdma_destroy_qp to clean up which will attempt to wait on
the free_qp completion, which is not initialized yet. Fix this
by initializing the completion before the ib_copy_to_udata call.
References
Configurations
Configuration 1 (hide)
|
History
28 Apr 2026, 12:46
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
|
| CWE | CWE-908 | |
| References | () https://git.kernel.org/stable/c/11a95521fb93c91e2d4ef9d53dc80ef0a755549b - Patch | |
| References | () https://git.kernel.org/stable/c/3cb88c12461b71c7d9c604aa2e6a9a477ecfa147 - Patch | |
| References | () https://git.kernel.org/stable/c/ac1da7bd224d406b6f1b84414f0f652ab43b6bd8 - Patch | |
| References | () https://git.kernel.org/stable/c/af310407f79d5816fc0ab3638e1588b6193316dd - Patch | |
| References | () https://git.kernel.org/stable/c/cd1534c8f4984432382c240f6784408497f5bb0a - Patch | |
| References | () https://git.kernel.org/stable/c/f72996834f7bdefc2b95e3eec30447ee195df44e - Patch |
22 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 14:16
Updated : 2026-04-28 12:46
NVD link : CVE-2026-31492
Mitre link : CVE-2026-31492
CVE.ORG link : CVE-2026-31492
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-908
Use of Uninitialized Resource
