Home

Description

In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown epf_ntb_epc_destroy() duplicates the teardown that the caller is supposed to perform later. This leads to an oops when .allow_link fails or when .drop_link is performed. The following is an example oops of the former case: Unable to handle kernel paging request at virtual address dead000000000108 [...] [dead000000000108] address between user and kernel address ranges Internal error: Oops: 0000000096000044 [#1] SMP [...] Call trace: pci_epc_remove_epf+0x78/0xe0 (P) pci_primary_epc_epf_link+0x88/0xa8 configfs_symlink+0x1f4/0x5a0 vfs_symlink+0x134/0x1d8 do_symlinkat+0x88/0x138 __arm64_sys_symlinkat+0x74/0xe0 [...] Remove the helper, and drop pci_epc_put(). EPC device refcounting is tied to the configfs EPC group lifetime, and pci_epc_put() in the .drop_link path is sufficient.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux

Product status

Default status
unaffected

e35f56bb03304abc92c928b641af41ca372966bb (git) before e238ab12556b00f3b4d8b870b32ba1e4f4d4ebc2
affected

e35f56bb03304abc92c928b641af41ca372966bb (git) before 73bf218de28d039126dc64281d2b47dd3c46a0a3
affected

e35f56bb03304abc92c928b641af41ca372966bb (git) before cec9ead73ab154a7953f6ab8dd5127e0d6bbf95a
affected

e35f56bb03304abc92c928b641af41ca372966bb (git) before 478e776101592eb63298714e96823ef78a3295ec
affected

e35f56bb03304abc92c928b641af41ca372966bb (git) before a7a3cab4d33fd8a8aed864c447d0d7c99e85404e
affected

e35f56bb03304abc92c928b641af41ca372966bb (git) before 0da63230d3ec1ec5fcc443a2314233e95bfece54
affected

e2b6ef72b7aea9d7d480d2df499bcd1c93247abb (git)
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.6.136 (semver)
unaffected

6.12.84 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0.1 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/e238ab12556b00f3b4d8b870b32ba1e4f4d4ebc2

git.kernel.org/...c/73bf218de28d039126dc64281d2b47dd3c46a0a3

git.kernel.org/...c/cec9ead73ab154a7953f6ab8dd5127e0d6bbf95a

git.kernel.org/...c/478e776101592eb63298714e96823ef78a3295ec

git.kernel.org/...c/a7a3cab4d33fd8a8aed864c447d0d7c99e85404e

git.kernel.org/...c/0da63230d3ec1ec5fcc443a2314233e95bfece54

cve.org (CVE-2026-31594)

nvd.nist.gov (CVE-2026-31594)

Download JSON