Description
In the Linux kernel, the following vulnerability has been resolved:

idpf: fix aux device unplugging when rdma is not supported by vport

If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not
allocate vdev_info for this vport. This leads to kernel NULL pointer
dereference in idpf_idc_vport_dev_down(), which references vdev_info for
every vport regardless.

Check, if vdev_info was ever allocated before unplugging aux device.
Published: 2026-02-04
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The Linux kernel driver idpf fails to allocate vdev_info when a virtual port does not have RDMA enabled, yet treats the information as if it were present. Unplugging an auxiliary device on such a virtual port leads to a null pointer dereference during cleanup, resulting in a kernel crash and a denial‑of‑service condition. The weakness is a classic NULL pointer dereference (CWE‑476) that can be triggered locally by an attacker who can cause the device to be unplugged. The likely attack vector is local, as the fault is triggered by manipulating the device unplug process.

Affected Systems

Linux kernel for all distributions that ship the unpatched idpf driver version. The vulnerability applies to every Linux kernel using the affected code and has RDMA‑unsupported vports, however no specific versions are listed.

Risk and Exploitability

CVSS score 7.0 indicates high severity. EPSS is below 1 %, showing that exploitation is considered unlikely at present. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local access to trigger unplugging of the auxiliary device on a vport lacking RDMA support; therefore the risk is confined to local attackers who can manipulate the driver. Because the flaw results in a kernel crash, the impact is denial of service rather than privilege escalation.

Generated by OpenCVE AI on April 17, 2026 at 23:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel update that contains the commit which fixes the null dereference in idpf.
  • While a patch is not available, avoid unplugging auxiliary devices on interfaces where RDMA is disabled or disable the vport’s auxiliary device support if possible.
  • Monitor system logs for kernel Oops or panic messages and schedule a kernel upgrade as soon as the patch is released.

Generated by OpenCVE AI on April 17, 2026 at 23:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Thu, 05 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 04 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: idpf: fix aux device unplugging when rdma is not supported by vport If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not allocate vdev_info for this vport. This leads to kernel NULL pointer dereference in idpf_idc_vport_dev_down(), which references vdev_info for every vport regardless. Check, if vdev_info was ever allocated before unplugging aux device.
Title idpf: fix aux device unplugging when rdma is not supported by vport
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-09T08:37:37.195Z

Reserved: 2026-01-13T15:37:45.944Z

Link: CVE-2026-23042

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-04T16:16:19.680

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23042

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-04T00:00:00Z

Links: CVE-2026-23042 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:00:09Z

Weaknesses