Use-after-free in Linux kernel - CVE-2026-31500
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to a use-after-free in btintel_hw_error() when handling a hardware error concurrently with device close operations. A local user can trigger a race condition to cause a denial of service.
The issue occurs because synchronous HCI command paths manipulate shared request state concurrently.
How to mitigate CVE-2026-31500
Sources
- https://git.kernel.org/stable/c/5f84e845648dfa86e42de5487f1a774b42f0444d
- https://git.kernel.org/stable/c/66696648af477dc87859e5e4b607112f5f29d010
- https://git.kernel.org/stable/c/94d8e6fe5d0818e9300e514e095a200bd5ff93ae
- https://git.kernel.org/stable/c/e10a4cb72468686ffbe8bb2b0520e37f6be1a0c5
- https://git.kernel.org/stable/c/f7d84737663ad4a120d2d8ef1561a4df91282c2e