Use-after-free in Linux kernel - CVE-2026-31555
Published: April 25, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper handling of a stale pointer in futex_lock_pi() retry path in kernel/futex/core.c when retrying priority-inheritance futex locking after owner exit handling. A local user can trigger repeated futex_lock_pi() operations to cause a kernel warning and crash.
How to mitigate CVE-2026-31555
Sources
- https://git.kernel.org/stable/c/210d36d892de5195e6766c45519dfb1e65f3eb83
- https://git.kernel.org/stable/c/33095ae3bdde5e5c264d7e88a2f3e7703a26c7aa
- https://git.kernel.org/stable/c/5e8e06bf8909e79b4acd950cf578cfc2f10bbefa
- https://git.kernel.org/stable/c/71112e62807d1925dc3ae6188b11f8cfc85aec23
- https://git.kernel.org/stable/c/7475dfad10a05a5bfadebf5f2499bd61b19ed293
- https://git.kernel.org/stable/c/92e47ad03e03dbb5515bdf06444bf6b1e147310d
- https://git.kernel.org/stable/c/de7c0c04ad868f2cee6671b11c0a6d20421af1da
- https://git.kernel.org/stable/c/e7824ec168d2ac883a213cd1f4d6cc0816002a85