can: isotp: fix tx.buf use-after-free in isotp_sendmsg()
Summary
| CVE | CVE-2026-31474 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:44 UTC |
| Updated | 2026-04-23 16:17:41 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix tx.buf use-after-free in isotp_sendmsg() isotp_sendmsg() uses only cmpxchg() on so->tx.state to serialize access to so->tx.buf. isotp_release() waits for ISOTP_IDLE via wait_event_interruptible() and then calls kfree(so->tx.buf). If a signal interrupts the wait_event_interruptible() inside close() while tx.state is ISOTP_SENDING, the loop exits early and release proceeds to force ISOTP_SHUTDOWN and continues to kfree(so->tx.buf) while sendmsg may still be reading so->tx.buf for the final CAN frame in isotp_fill_dataframe(). The so->tx.buf can be allocated once when the standard tx.buf length needs to be extended. Move the kfree() of this potentially extended tx.buf to sk_destruct time when either isotp_sendmsg() and isotp_release() are done. |
Risk And Classification
EPSS: 0.000180000 probability, percentile 0.047780000 (date 2026-04-24)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 96d1c81e6a0478535342dff6c730adb076cd84e8 cb3d6efa78460e6d50bf68806d0db66265709f64 git | Not specified |
| CNA | Linux | Linux | affected 96d1c81e6a0478535342dff6c730adb076cd84e8 9649d051e54413049c009638ec1dc23962c884a4 git | Not specified |
| CNA | Linux | Linux | affected 96d1c81e6a0478535342dff6c730adb076cd84e8 eec8a1b18a79600bd4419079dc0026c1db72a830 git | Not specified |
| CNA | Linux | Linux | affected 96d1c81e6a0478535342dff6c730adb076cd84e8 2e62e7051eca75a7f2e3d52d62ec10d7d7aa358c git | Not specified |
| CNA | Linux | Linux | affected 96d1c81e6a0478535342dff6c730adb076cd84e8 424e95d62110cdbc8fd12b40918f37e408e35a92 git | Not specified |
| CNA | Linux | Linux | affected 6.4 | Not specified |
| CNA | Linux | Linux | unaffected 6.4 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.131 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.80 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.21 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.11 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/9649d051e54413049c009638ec1dc23962c884a4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/424e95d62110cdbc8fd12b40918f37e408e35a92 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/eec8a1b18a79600bd4419079dc0026c1db72a830 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/cb3d6efa78460e6d50bf68806d0db66265709f64 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/2e62e7051eca75a7f2e3d52d62ec10d7d7aa358c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.