Use-after-free in Linux kernel - CVE-2026-31656
Published: April 25, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to use-after-free in intel_engine_park_heartbeat when racing the heartbeat worker and request retirement paths while releasing engine->heartbeat.systole. A local user can trigger concurrent request retirement and heartbeat handling to cause a denial of service.
The issue arises because the same systole request can be released twice after a stale non-NULL pointer is observed in a non-atomic read-and-clear sequence.
How to mitigate CVE-2026-31656
Sources
- https://git.kernel.org/stable/c/2af8b200cae3fdd0e917ecc2753b28bb40c876c1
- https://git.kernel.org/stable/c/455d98ed527fc94eed90406f90ab2391464ca657
- https://git.kernel.org/stable/c/4c71fd099513bfa8acab529b626e1f0097b76061
- https://git.kernel.org/stable/c/70d3e622b10092fc483e28e57b4e8c49d9cc7f68
- https://git.kernel.org/stable/c/8ce44d28a84fd5e053a88b04872a89d95c0779d4
- https://git.kernel.org/stable/c/a00e92bf6583d019a4fb2c2df7007e6c9b269ce7
- https://git.kernel.org/stable/c/ca3f48c3567dd49efdc55b80029ae74659c682ee