U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31565 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix deadlock during netdev reset with active connections Resolve deadlock that occurs when user executes netdev reset while RDMA applications (e.g., rping) are active. The netdev reset causes ice driver to remove irdma auxiliary driver, triggering device_delete and subsequent client removal. During client removal, uverbs_client waits for QP reference count to reach zero while cma_client holds the final reference, creating circular dependency and indefinite wait in iWARP mode. Skip QP reference count wait during device reset to prevent deadlock.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/009831768faeca3fb5950ce63f1b49594ec82389 kernel.org
https://git.kernel.org/stable/c/464bbb844ba5b68e038220c34019069a0a9f1581 kernel.org
https://git.kernel.org/stable/c/6f52370970ac07d352a7af4089e55e0e6425f827 kernel.org
https://git.kernel.org/stable/c/a8a1c7621127a15a02494b96ee376406c064237b kernel.org
https://git.kernel.org/stable/c/acb060bc2609c2eab49263968be59c7d59d497bc kernel.org
https://git.kernel.org/stable/c/adf0de36e52a48681eb58cbd7cbf6c8d200caa2b kernel.org
https://git.kernel.org/stable/c/cd8bcec2de5e24e05c34c9391940fda6f50e79b4 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31565
NVD Published Date:
04/24/2026
NVD Last Modified:
04/24/2026
Source:
kernel.org