๐Ÿ” CVE Alert

CVE-2026-31504

UNKNOWN 0.0

net: fix fanout UAF in packet_release() via NETDEV_UP race

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: fix fanout UAF in packet_release() via NETDEV_UP race `packet_release()` has a race window where `NETDEV_UP` can re-register a socket into a fanout group's `arr[]` array. The re-registration is not cleaned up by `fanout_release()`, leaving a dangling pointer in the fanout array. `packet_release()` does NOT zero `po->num` in its `bind_lock` section. After releasing `bind_lock`, `po->num` is still non-zero and `po->ifindex` still matches the bound device. A concurrent `packet_notifier(NETDEV_UP)` that already found the socket in `sklist` can re-register the hook. For fanout sockets, this re-registration calls `__fanout_link(sk, po)` which adds the socket back into `f->arr[]` and increments `f->num_members`, but does NOT increment `f->sk_ref`. The fix sets `po->num` to zero in `packet_release` while `bind_lock` is held to prevent NETDEV_UP from linking, preventing the race window. This bug was found following an additional audit with Claude Code based on CVE-2025-38617.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ce06b03e60fc19c680d1bf873e779bf11c2fc518 < ee642b1962caa9aa231c01abbd58bc453ae6b66e ce06b03e60fc19c680d1bf873e779bf11c2fc518 < 42cfd7898eeed290c9fb73f732af1f7d6b0a703e ce06b03e60fc19c680d1bf873e779bf11c2fc518 < 1b4c03f8892d955385c202009af7485364731bb9 ce06b03e60fc19c680d1bf873e779bf11c2fc518 < 654386baef228c2992dbf604c819e4c7c35fc71b ce06b03e60fc19c680d1bf873e779bf11c2fc518 < 75fe6db23705a1d55160081f7b37db9665b1880b ce06b03e60fc19c680d1bf873e779bf11c2fc518 < d0c7cdc15fdf8c4f91aca1928e52295d175b6ec6 ce06b03e60fc19c680d1bf873e779bf11c2fc518 < ceccbfc6de720ad633519a226715989cfb065af1 ce06b03e60fc19c680d1bf873e779bf11c2fc518 < 42156f93d123436f2a27c468f18c966b7e5db796
Linux / Linux
3.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ee642b1962caa9aa231c01abbd58bc453ae6b66e git.kernel.org: https://git.kernel.org/stable/c/42cfd7898eeed290c9fb73f732af1f7d6b0a703e git.kernel.org: https://git.kernel.org/stable/c/1b4c03f8892d955385c202009af7485364731bb9 git.kernel.org: https://git.kernel.org/stable/c/654386baef228c2992dbf604c819e4c7c35fc71b git.kernel.org: https://git.kernel.org/stable/c/75fe6db23705a1d55160081f7b37db9665b1880b git.kernel.org: https://git.kernel.org/stable/c/d0c7cdc15fdf8c4f91aca1928e52295d175b6ec6 git.kernel.org: https://git.kernel.org/stable/c/ceccbfc6de720ad633519a226715989cfb065af1 git.kernel.org: https://git.kernel.org/stable/c/42156f93d123436f2a27c468f18c966b7e5db796