Description
In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix deadlock during netdev reset with active connections

Resolve deadlock that occurs when user executes netdev reset while RDMA
applications (e.g., rping) are active. The netdev reset causes ice
driver to remove irdma auxiliary driver, triggering device_delete and
subsequent client removal. During client removal, uverbs_client waits
for QP reference count to reach zero while cma_client holds the final
reference, creating circular dependency and indefinite wait in iWARP
mode. Skip QP reference count wait during device reset to prevent
deadlock.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

In the Linux kernel’s RDMA/irdma subsystem a deadlock can occur when the network device driver is reset while active iWARP connections exist. The reset removes the irdma auxiliary driver, leading to device deletion and client removal. During this process, the uverbs_client waits for the QP reference count to fall to zero while the cma_client holds the final reference, creating a circular dependency that blocks the system indefinitely. The result is an unintended hang of RDMA services and a denial of network connectivity for applications that rely on iWARP. The weakness is represented by CWE‑667 (deadlock).

Affected Systems

The vulnerability affects all versions of the Linux kernel that include the irdma driver, specifically the stable 6.4 line and all 7.0 release candidates from rc1 through rc7. The corresponding CPE identifiers indicate that any Linux operating system running these kernel versions is susceptible unless the irdma driver is disabled or the kernel has been patched to remove the circular dependency.

Risk and Exploitability

The CVSS score of 5.5 denotes moderate impact, and the EPSS score of less than 1 % indicates a very low likelihood of exploitation at present. Because inducing the deadlock requires a netdev reset during active RDMA traffic—a capability typically restricted to privileged users—the primary exploitation surface is local system compromise or misconfiguration. The vulnerability is not listed in CISA’s KEV catalog, and no public exploit has been reported. Nonetheless the symptom—a hung RDMA subsystem—can disrupt critical workloads dependent on high‑performance network interfacing, so immediate mitigation is advised.

Generated by OpenCVE AI on April 28, 2026 at 14:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a patched release that removes the deadlock (e.g., commit 009831768fae in the 6.4 or 7.0 branch).
  • If an upgrade is not immediately possible, stop all RDMA services (e.g., rping) and unload the irdma driver before performing any network device reset.
  • Monitor the system for hangs after netdev resets and ensure that no active iWARP connections are present during maintenance windows.

Generated by OpenCVE AI on April 28, 2026 at 14:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-667
CPEs cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-911
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix deadlock during netdev reset with active connections Resolve deadlock that occurs when user executes netdev reset while RDMA applications (e.g., rping) are active. The netdev reset causes ice driver to remove irdma auxiliary driver, triggering device_delete and subsequent client removal. During client removal, uverbs_client waits for QP reference count to reach zero while cma_client holds the final reference, creating circular dependency and indefinite wait in iWARP mode. Skip QP reference count wait during device reset to prevent deadlock.
Title RDMA/irdma: Fix deadlock during netdev reset with active connections
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:11:14.564Z

Reserved: 2026-03-09T15:48:24.117Z

Link: CVE-2026-31565

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:30.950

Modified: 2026-04-27T20:31:57.490

Link: CVE-2026-31565

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31565 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:15:34Z

Weaknesses