CVE-2026-31576

In the Linux kernel, the following vulnerability has been resolved: media: hackrf: fix to not free memory after the device is registered in hackrf_probe() In hackrf driver, the following race condition occurs: ``` CPU0 CPU1 hackrf_probe() kzalloc(); // alloc hackrf_dev .... v4l2_device_register(); .... fd = sys_open("/path/to/dev"); // open hackrf fd .... v4l2_device_unregister(); .... kfree(); // free hackrf_dev .... sys_ioctl(fd, ...); v4l2_ioctl(); video_is_registered() // UAF!! .... sys_close(fd); v4l2_release() // UAF!! hackrf_video_release() kfree(); // DFB!! ``` When a V4L2 or video device is unregistered, the device node is removed so new open() calls are blocked. However, file descriptors that are already open-and any in-flight I/O-do not terminate immediately; they remain valid until the last reference is dropped and the driver's release() is invoked. Therefore, freeing device memory on the error path after hackrf_probe() has registered dev it will lead to a race to use-after-free vuln, since those already-open handles haven't been released yet. And since release() free memory too, race to use-after-free and double-free vuln occur. To prevent this, if device is registered from probe(), it should be modified to free memory only through release() rather than calling kfree() directly.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Apr 2026, 20:40

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/07e9e674b6146b1f6fc41b1f54b8968bf2802824 - () https://git.kernel.org/stable/c/07e9e674b6146b1f6fc41b1f54b8968bf2802824 - Patch
References () https://git.kernel.org/stable/c/2145c71a8044362e82e9923f001ba2aeb771b848 - () https://git.kernel.org/stable/c/2145c71a8044362e82e9923f001ba2aeb771b848 - Patch
References () https://git.kernel.org/stable/c/3b7da2b4d0fe014eff181ed37e3bf832eb8ed258 - () https://git.kernel.org/stable/c/3b7da2b4d0fe014eff181ed37e3bf832eb8ed258 - Patch
References () https://git.kernel.org/stable/c/45cbaf5c7cdc5386d86377f0daf94a17a007fed0 - () https://git.kernel.org/stable/c/45cbaf5c7cdc5386d86377f0daf94a17a007fed0 - Patch
References () https://git.kernel.org/stable/c/98a0a81ce78020c2522e0046f49d200de9778cb9 - () https://git.kernel.org/stable/c/98a0a81ce78020c2522e0046f49d200de9778cb9 - Patch
References () https://git.kernel.org/stable/c/fcd1d70792a35c8a97414fe429f48311e41269c2 - () https://git.kernel.org/stable/c/fcd1d70792a35c8a97414fe429f48311e41269c2 - Patch

27 Apr 2026, 14:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/45cbaf5c7cdc5386d86377f0daf94a17a007fed0 -

27 Apr 2026, 12:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3b7da2b4d0fe014eff181ed37e3bf832eb8ed258 -

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-27 20:40


NVD link : CVE-2026-31576

Mitre link : CVE-2026-31576

CVE.ORG link : CVE-2026-31576


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free