CVE-2026-31474

HIGH

can: isotp: fix tx.buf use-after-free in isotp_sendmsg()

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix tx.buf use-after-free in isotp_sendmsg() isotp_sendmsg() uses only cmpxchg() on so->tx.state to serialize access to so->tx.buf. isotp_release() waits for ISOTP_IDLE via wait_event_interruptible() and then calls kfree(so->tx.buf). If a signal interrupts the wait_event_interruptible() inside close() while tx.state is ISOTP_SENDING, the loop exits early and release proceeds to force ISOTP_SHUTDOWN and continues to kfree(so->tx.buf) while sendmsg may still be reading so->tx.buf for the final CAN frame in isotp_fill_dataframe(). The so->tx.buf can be allocated once when the standard tx.buf length needs to be extended. Move the kfree() of this potentially extended tx.buf to sk_destruct time when either isotp_sendmsg() and isotp_release() are done.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-416
Status published
Products (15)
Linux/Linux < 6.4
Linux/Linux 6.12.80 - 6.12.*
Linux/Linux 6.18.21 - 6.18.*
Linux/Linux 6.19.11 - 6.19.*
Linux/Linux 6.4
Linux/Linux 6.6.131 - 6.6.*
Linux/Linux 7.0
Linux/Linux 96d1c81e6a0478535342dff6c730adb076cd84e8 - 2e62e7051eca75a7f2e3d52d62ec10d7d7aa358c
Linux/Linux 96d1c81e6a0478535342dff6c730adb076cd84e8 - 424e95d62110cdbc8fd12b40918f37e408e35a92
Linux/Linux 96d1c81e6a0478535342dff6c730adb076cd84e8 - 9649d051e54413049c009638ec1dc23962c884a4
... and 5 more
Published Apr 22, 2026
Tracked Since Apr 22, 2026