Description
In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix possible invalid memory access after FLR

In the case that the first Function Level Reset (FLR) concludes
correctly, but in the second FLR the scratch area for the saved
configuration cannot be allocated, it's possible for a invalid memory
access to happen.

Always set the deallocated scratch area to NULL after FLR completes.
Published: 2026-04-22
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: Kernel memory corruption / crash
Action: Apply patch
AI Analysis

Impact

A flaw in the idxd dmaengine driver can trigger an invalid memory access when a second Function Level Reset (FLR) fails to allocate its scratch area, after a successful first FLR. The driver does not set the deallocated scratch area to NULL, leaving a dangling reference that may be dereferenced during the FLR process, potentially leading to a kernel memory corruption or crash.

Affected Systems

This vulnerability affects any system running the Linux kernel that includes the idxd dmaengine driver, which is common on platforms that provide Intel Data Plane Acceleration (DPA) infrastructure. The discrepancy is limited to kernels that have not been updated to include the corrective changes. No specific kernel version is listed, so all kernels using the vulnerable driver path are at risk until the patch is applied.

Risk and Exploitability

Because the flaw resides in a kernel driver, exploitation would likely require local privileged access or the ability to trigger a Function Level Reset via a device interface. A successful exploitation could cause a kernel panic or memory corruption, leading to denial of service or, if memory corruption is leveraged, escalation of privileges. The EPSS score is not available, and the vulnerability is not currently listed in the CISA KEV catalog, suggesting that active exploitation is not widely reported at this time. Nevertheless, the high impact of a kernel crash warrants immediate attention.

Generated by OpenCVE AI on April 22, 2026 at 19:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the patch that clears the scratch area after an FLR
  • Verify that the specific commit hashes (e.g., 504c0e6, 867d0c8, d6077df) are present in the kernel source to ensure the fix is applied
  • If a kernel update is not immediately possible, refrain from performing Function Level Resets on idxd devices until the issue is resolved

Generated by OpenCVE AI on April 22, 2026 at 19:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 22 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CWE-476

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible invalid memory access after FLR In the case that the first Function Level Reset (FLR) concludes correctly, but in the second FLR the scratch area for the saved configuration cannot be allocated, it's possible for a invalid memory access to happen. Always set the deallocated scratch area to NULL after FLR completes.
Title dmaengine: idxd: Fix possible invalid memory access after FLR
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-22T13:53:39.895Z

Reserved: 2026-03-09T15:48:24.090Z

Link: CVE-2026-31442

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T14:16:37.703

Modified: 2026-04-22T14:16:37.703

Link: CVE-2026-31442

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31442 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T19:15:24Z

Weaknesses