Use-after-free in Linux kernel - CVE-2026-31695
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to use-after-free in the virt_wifi net device handling when performing ethtool operations on a virt_wifi device that is being unregistered. A local user can send a specially crafted netlink message to trigger the use-after-free and cause a denial of service.
The issue occurs because the device parent reference may point to freed memory during unregister processing.
How to mitigate CVE-2026-31695
Sources
- https://git.kernel.org/stable/c/5adc01506da94dfaab76f3d1b8410a8ca7bfc59d
- https://git.kernel.org/stable/c/5bbadf60b121065ffb267ec92018607b9c1c7524
- https://git.kernel.org/stable/c/789b06f9f39cdc7e895bdab2c034e39c41c8f8d6
- https://git.kernel.org/stable/c/c5fa98842783ed227365d1303785de6a67020c8d
- https://git.kernel.org/stable/c/d1e3aa80e6e04410ba89eaaba4441a0d749d181d
- https://git.kernel.org/stable/c/dcb5915696bd7b32b6404a897c24ee47cb23e772
- https://git.kernel.org/stable/c/e90f3e74e1ebc26c461a74be490d322716bcdcb4