VYPR
Medium severity5.5NVD Advisory· Published Apr 24, 2026· Updated Apr 29, 2026

CVE-2026-31595

CVE-2026-31595

Description

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup

Disable the delayed work before clearing BAR mappings and doorbells to avoid running the handler after resources have been torn down.

Unable to handle kernel paging request at virtual address ffff800083f46004 [...] Internal error: Oops: 0000000096000007 [#1] SMP [...] Call trace: epf_ntb_cmd_handler+0x54/0x200 [pci_epf_vntb] (P) process_one_work+0x154/0x3b0 worker_thread+0x2c8/0x400 kthread+0x148/0x210 ret_from_fork+0x10/0x20

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free in Linux kernel's PCI endpoint NTB driver (pci-epf-vntb) occurs when the delayed work handler runs after resource cleanup.

Root

Cause

In the Linux kernel's PCI endpoint NTB driver (pci-epf-vntb), the epf_ntb_epc_cleanup function clears BAR mappings and doorbells without first stopping the delayed work queue (cmd_handler). This creates a race condition where the epf_ntb_cmd_handler work item can execute after the resources it accesses have been freed, leading to a use-after-free [1][2][3][4].

Exploitation

The vulnerability is triggered during device teardown or reconfiguration. An attacker with local access and the ability to trigger PCI endpoint removal or reset can cause the kernel to access freed memory. No special privileges beyond local user access are required, as the race occurs in normal driver cleanup paths [1][2][3][4].

Impact

Successful exploitation results in a kernel crash (Oops) due to an invalid memory access, as shown by the call trace in the CVE description. This can lead to a denial of service (system panic) or potentially allow an attacker to escalate privileges if the freed memory is reallocated and controlled [1][2][3][4].

Mitigation

The fix is to call cancel the delayed work (cancel_delayed_work) before tearing down resources in epf_ntb_epc_cleanup`. The patch has been applied to the Linux kernel stable branches and is available in commits [1][2][3][4]. Users should update to a kernel version containing the fix.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: >=6.0,<6.6.136

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.