Use-after-free in Linux kernel - CVE-2026-31469
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to use-after-free in the virtio_net driver transmit path when transmitting packets after the network namespace is destroyed while previously queued skbs are still pending. A local user can trigger packet transmission and network namespace teardown to cause a denial of service.
The issue occurs when the virtio_net driver is configured with napi_tx disabled and the device's IFF_XMIT_DST_RELEASE flag is cleared.
How to mitigate CVE-2026-31469
Sources
- https://git.kernel.org/stable/c/63d45077b97bb0e0fe0c75931acbbca7a47af141
- https://git.kernel.org/stable/c/8a4790850e710fd6771e4d2112168ed1dd6c0e54
- https://git.kernel.org/stable/c/9a18629f2525781f0f3dda7be72b204e4cf77d08
- https://git.kernel.org/stable/c/ba8bda9a0896746053aa97ac6c3e08168729172c
- https://git.kernel.org/stable/c/be0e63f3b97bbaf453c542e8a15ba2a536e2ac01
- https://git.kernel.org/stable/c/c1ec36cb3768574b916f20d2d7415fd14fa1bf12
- https://git.kernel.org/stable/c/f04733c4dc40c43899c3d1c97afbae5831a3770f
- https://git.kernel.org/stable/c/fedd2e1630cac920844997227ccbe7b26a76375a