PT-2026-34658 · Linux · Linux
Published
2026-04-23
·
Updated
2026-04-23
·
CVE-2026-31532
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
can: raw: fix ro->uniq use-after-free in raw rcv()
raw release() unregisters raw CAN receive filters via can rx unregister(),
but receiver deletion is deferred with call rcu(). This leaves a window
where raw rcv() may still be running in an RCU read-side critical section
after raw release() frees ro->uniq, leading to a use-after-free of the
percpu uniq storage.
Move free percpu(ro->uniq) out of raw release() and into a raw-specific
socket destructor. can rx unregister() takes an extra reference to the
socket and only drops it from the RCU callback, so freeing uniq from
sk destruct ensures the percpu area is not released until the relevant
callbacks have drained.
[mkl: applied manually]
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux