Search for vulnerabilities
| Vulnerability ID | VCID-pgrh-f1dv-27dh |
| Aliases |
CVE-2026-31595
|
| Summary | In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup Disable the delayed work before clearing BAR mappings and doorbells to avoid running the handler after resources have been torn down. Unable to handle kernel paging request at virtual address ffff800083f46004 [...] Internal error: Oops: 0000000096000007 [#1] SMP [...] Call trace: epf_ntb_cmd_handler+0x54/0x200 [pci_epf_vntb] (P) process_one_work+0x154/0x3b0 worker_thread+0x2c8/0x400 kthread+0x148/0x210 ret_from_fork+0x10/0x20 |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 2.4 |
| Risk | 1.2 |
| Affected and Fixed Packages | Package Details |
| CWE-366 | Race Condition within a Thread |
| System | Score | Found at |
|---|---|---|
| epss | 0.00013 | https://api.first.org/data/v1/epss?cve=CVE-2026-31595 |
| epss | 0.00013 | https://api.first.org/data/v1/epss?cve=CVE-2026-31595 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2026-31595 |
| epss | 0.00024 | https://api.first.org/data/v1/epss?cve=CVE-2026-31595 |
| cvssv3.1 | 4.7 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.02278 |
| EPSS Score | 0.00013 |
| Published At | May 5, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-25T23:21:31.957319+00:00 | Debian Importer | Import | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |