CVE-2026-31474
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
22/04/2026
Última modificación:
23/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: isotp: fix tx.buf use-after-free in isotp_sendmsg()<br />
<br />
isotp_sendmsg() uses only cmpxchg() on so->tx.state to serialize access<br />
to so->tx.buf. isotp_release() waits for ISOTP_IDLE via<br />
wait_event_interruptible() and then calls kfree(so->tx.buf).<br />
<br />
If a signal interrupts the wait_event_interruptible() inside close()<br />
while tx.state is ISOTP_SENDING, the loop exits early and release<br />
proceeds to force ISOTP_SHUTDOWN and continues to kfree(so->tx.buf)<br />
while sendmsg may still be reading so->tx.buf for the final CAN frame<br />
in isotp_fill_dataframe().<br />
<br />
The so->tx.buf can be allocated once when the standard tx.buf length needs<br />
to be extended. Move the kfree() of this potentially extended tx.buf to<br />
sk_destruct time when either isotp_sendmsg() and isotp_release() are done.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/2e62e7051eca75a7f2e3d52d62ec10d7d7aa358c
- https://git.kernel.org/stable/c/424e95d62110cdbc8fd12b40918f37e408e35a92
- https://git.kernel.org/stable/c/9649d051e54413049c009638ec1dc23962c884a4
- https://git.kernel.org/stable/c/cb3d6efa78460e6d50bf68806d0db66265709f64
- https://git.kernel.org/stable/c/eec8a1b18a79600bd4419079dc0026c1db72a830



