Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: fix fanout UAF in packet_release() via NETDEV_UP race `packet_release()` has a race window where `NETDEV_UP` can re-register a socket into a fanout group's `arr[]` array. The re-registration is not cleaned up by `fanout_release()`, leaving a dangling pointer in the fanout array. `packet_release()` does NOT zero `po->num` in its `bind_lock` section. After releasing `bind_lock`, `po->num` is still non-zero and `po->ifindex` still matches the bound device. A concurrent `packet_notifier(NETDEV_UP)` that already found the socket in `sklist` can re-register the hook. For fanout sockets, this re-registration calls `__fanout_link(sk, po)` which adds the socket back into `f->arr[]` and increments `f->num_members`, but does NOT increment `f->sk_ref`. The fix sets `po->num` to zero in `packet_release` while `bind_lock` is held to prevent NETDEV_UP from linking, preventing the race window. This bug was found following an additional audit with Claude Code based on CVE-2025-38617.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-22 | Updated 2026-04-22 | Assigner Linux

Product status

Default status
unaffected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before ee642b1962caa9aa231c01abbd58bc453ae6b66e
affected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before 42cfd7898eeed290c9fb73f732af1f7d6b0a703e
affected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before 1b4c03f8892d955385c202009af7485364731bb9
affected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before 654386baef228c2992dbf604c819e4c7c35fc71b
affected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before 75fe6db23705a1d55160081f7b37db9665b1880b
affected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before d0c7cdc15fdf8c4f91aca1928e52295d175b6ec6
affected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before ceccbfc6de720ad633519a226715989cfb065af1
affected

ce06b03e60fc19c680d1bf873e779bf11c2fc518 (git) before 42156f93d123436f2a27c468f18c966b7e5db796
affected

Default status
affected

3.1
affected

Any version before 3.1
unaffected

5.10.253 (semver)
unaffected

5.15.203 (semver)
unaffected

6.1.168 (semver)
unaffected

6.6.131 (semver)
unaffected

6.12.80 (semver)
unaffected

6.18.21 (semver)
unaffected

6.19.11 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ee642b1962caa9aa231c01abbd58bc453ae6b66e

git.kernel.org/...c/42cfd7898eeed290c9fb73f732af1f7d6b0a703e

git.kernel.org/...c/1b4c03f8892d955385c202009af7485364731bb9

git.kernel.org/...c/654386baef228c2992dbf604c819e4c7c35fc71b

git.kernel.org/...c/75fe6db23705a1d55160081f7b37db9665b1880b

git.kernel.org/...c/d0c7cdc15fdf8c4f91aca1928e52295d175b6ec6

git.kernel.org/...c/ceccbfc6de720ad633519a226715989cfb065af1

git.kernel.org/...c/42156f93d123436f2a27c468f18c966b7e5db796

cve.org (CVE-2026-31504)

nvd.nist.gov (CVE-2026-31504)

Download JSON