Description
In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup

Disable the delayed work before clearing BAR mappings and doorbells to
avoid running the handler after resources have been torn down.

Unable to handle kernel paging request at virtual address ffff800083f46004
[...]
Internal error: Oops: 0000000096000007 [#1] SMP
[...]
Call trace:
epf_ntb_cmd_handler+0x54/0x200 [pci_epf_vntb] (P)
process_one_work+0x154/0x3b0
worker_thread+0x2c8/0x400
kthread+0x148/0x210
ret_from_fork+0x10/0x20
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A defect in the Linux PCI endpoint driver causes delayed work to run after the driver has torn down hardware resources, leading to an invalid memory access and a kernel oops. The crash results in a system halt, denying availability of the system.

Affected Systems

The vulnerability exists in the Linux kernel’s PCI firmware endpoint for NTB devices. Any Linux installation that includes the epf_ntb driver prior to the patch is affected; the specific kernel version affected is not listed, so all kernels containing the vulnerable code are at risk.

Risk and Exploitability

The CVSS score is 5.5, but the vulnerability is not listed in CISA KEV, and the EPSS score is less than 1%, indicating a very low current exploitation probability. The attack likely requires local privilege or an ability to manipulate the PCI endpoint to trigger the delayed work, so exploitation is possible but not trivial. Because the flaw results in a crash rather than code execution, the primary impact is a denial of service.

Generated by OpenCVE AI on April 29, 2026 at 17:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel update that includes commit 5999067140c67530a6cb6f41a8471596e60452cb, which resolves the improper precondition check (CWE-366) by stopping delayed work before freeing resources.
  • If a kernel update is not yet available, prevent the epf_ntb driver from loading by adding "blacklist epf_ntb" to /etc/modprobe.d/blacklist.conf or unloading the module with "modprobe -r epf_ntb" after boot.
  • After applying the patch or disabling the driver, reboot the system to ensure no delayed work is scheduled; verify that the kernel no longer attempts to access freed BAR mappings or doorbells.

Generated by OpenCVE AI on April 29, 2026 at 17:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Wed, 29 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 27 Apr 2026 14:15:00 +0000


Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup Disable the delayed work before clearing BAR mappings and doorbells to avoid running the handler after resources have been torn down. Unable to handle kernel paging request at virtual address ffff800083f46004 [...] Internal error: Oops: 0000000096000007 [#1] SMP [...] Call trace: epf_ntb_cmd_handler+0x54/0x200 [pci_epf_vntb] (P) process_one_work+0x154/0x3b0 worker_thread+0x2c8/0x400 kthread+0x148/0x210 ret_from_fork+0x10/0x20
Title PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:11:49.806Z

Reserved: 2026-03-09T15:48:24.121Z

Link: CVE-2026-31595

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:37.237

Modified: 2026-04-29T14:22:35.743

Link: CVE-2026-31595

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31595 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T17:30:16Z

Weaknesses