CVE-2026-31504: In the Linux kernel, the following vulnerability has been resolved: net: fix fanout UAF in packet_release() via NETDEV_
Summary
A race condition vulnerability exists in the Linux kernel's packet networking code where `packet_release()` can leave a dangling pointer in a fanout group's array (a data structure for managing network packet distribution). The problem occurs because `NETDEV_UP` (a network device startup event) can re-register a socket into the array after `packet_release()` begins cleanup but before it finishes, creating a use-after-free bug (accessing memory that has been freed).
Solution / Mitigation
The fix sets `po->num` to zero in `packet_release()` while `bind_lock` is held to prevent `NETDEV_UP` from linking and closing the race window.
Vulnerability Details
EPSS: 0.0%
April 22, 2026
Classification
Original source: https://nvd.nist.gov/vuln/detail/CVE-2026-31504
First tracked: April 22, 2026 at 02:08 PM
Classified by LLM (prompt v3) · confidence: 95%