Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() At the end of this function, d is the traversal cursor of flist, but the code completes found instead. This can lead to issues such as NULL pointer dereferences, double completion, or descriptor leaks. Fix this by completing d instead of found in the final list_for_each_entry_safe() loop.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.8, < 6.12.80 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0e4f43779d550e559be13a5cdb763bad92c4cc99Patch
- https://git.kernel.org/stable/c/82656e8daf8de00935ae91b91bed43f4d6e0d644Patch
- https://git.kernel.org/stable/c/e1c9866173c5f8521f2d0768547a01508cb9ff27Patch
- https://git.kernel.org/stable/c/e21da2ad8844585040fe4b82be1ad2fe99d40074Patch
FAQ
What is CVE-2026-31436?
CVE-2026-31436 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() At the end of this function, d is the traversal cu...
How severe is CVE-2026-31436?
CVE-2026-31436 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-31436?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.