Double free in Linux kernel - CVE-2026-31507
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to double free in smc_rx_pipe_buf_release() and SMC splice pipe buffer handling when duplicating splice pipe buffers with tee(2) or splice_pipe_to_pipe(). A local user can duplicate an SMC splice buffer to cause a denial of service.
The issue can trigger a slab-use-after-free that leads to a NULL-pointer dereference and kernel panic.
How to mitigate CVE-2026-31507
Sources
- https://git.kernel.org/stable/c/24dd586bb4cbba1889a50abe74143817a095c1c9
- https://git.kernel.org/stable/c/3cc76380fea749280c026f410af56a28aaac388a
- https://git.kernel.org/stable/c/54c87a730157868543ebdfa0ecb21b4590ed23a5
- https://git.kernel.org/stable/c/7bcb974c771c863e8588cea0012ac204443a7126
- https://git.kernel.org/stable/c/7e8916f46c2f48607f907fd401590093753a6bc5
- https://git.kernel.org/stable/c/81acbd345d405994875d419d43b319fee0b9ad62
- https://git.kernel.org/stable/c/98ba5cb274768146e25ffbfde47753652c1c20d3
- https://git.kernel.org/stable/c/ae5575e660410c8d2c5d38fb28a0f37aea945676