{
  "public_date" : "2026-05-01T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free",
    "id" : "2464466",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2464466"
  },
  "cwe" : "CWE-825",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nwifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free\nCurrently we execute `SET_NETDEV_DEV(dev, &priv->lowerdev->dev)` for\nthe virt_wifi net devices. However, unregistering a virt_wifi device in\nnetdev_run_todo() can happen together with the device referenced by\nSET_NETDEV_DEV().\nIt can result in use-after-free during the ethtool operations performed\non a virt_wifi device that is currently being unregistered. Such a net\ndevice can have the `dev.parent` field pointing to the freed memory,\nbut ethnl_ops_begin() calls `pm_runtime_get_sync(dev->dev.parent)`.\nLet's remove SET_NETDEV_DEV for virt_wifi to avoid bugs like this:\n==================================================================\nBUG: KASAN: slab-use-after-free in __pm_runtime_resume+0xe2/0xf0\nRead of size 2 at addr ffff88810cfc46f8 by task pm/606\nCall Trace:\n<TASK>\ndump_stack_lvl+0x4d/0x70\nprint_report+0x170/0x4f3\n? __pfx__raw_spin_lock_irqsave+0x10/0x10\nkasan_report+0xda/0x110\n? __pm_runtime_resume+0xe2/0xf0\n? __pm_runtime_resume+0xe2/0xf0\n__pm_runtime_resume+0xe2/0xf0\nethnl_ops_begin+0x49/0x270\nethnl_set_features+0x23c/0xab0\n? __pfx_ethnl_set_features+0x10/0x10\n? kvm_sched_clock_read+0x11/0x20\n? local_clock_noinstr+0xf/0xf0\n? local_clock+0x10/0x30\n? kasan_save_track+0x25/0x60\n? __kasan_kmalloc+0x7f/0x90\n? genl_family_rcv_msg_attrs_parse.isra.0+0x150/0x2c0\ngenl_family_rcv_msg_doit+0x1e7/0x2c0\n? __pfx_genl_family_rcv_msg_doit+0x10/0x10\n? __pfx_cred_has_capability.isra.0+0x10/0x10\n? stack_trace_save+0x8e/0xc0\ngenl_rcv_msg+0x411/0x660\n? __pfx_genl_rcv_msg+0x10/0x10\n? __pfx_ethnl_set_features+0x10/0x10\nnetlink_rcv_skb+0x121/0x380\n? __pfx_genl_rcv_msg+0x10/0x10\n? __pfx_netlink_rcv_skb+0x10/0x10\n? __pfx_down_read+0x10/0x10\ngenl_rcv+0x23/0x30\nnetlink_unicast+0x60f/0x830\n? __pfx_netlink_unicast+0x10/0x10\n? __pfx___alloc_skb+0x10/0x10\nnetlink_sendmsg+0x6ea/0xbc0\n? __pfx_netlink_sendmsg+0x10/0x10\n? __futex_queue+0x10b/0x1f0\n____sys_sendmsg+0x7a2/0x950\n? copy_msghdr_from_user+0x26b/0x430\n? __pfx_____sys_sendmsg+0x10/0x10\n? __pfx_copy_msghdr_from_user+0x10/0x10\n___sys_sendmsg+0xf8/0x180\n? __pfx____sys_sendmsg+0x10/0x10\n? __pfx_futex_wait+0x10/0x10\n? fdget+0x2e4/0x4a0\n__sys_sendmsg+0x11f/0x1c0\n? __pfx___sys_sendmsg+0x10/0x10\ndo_syscall_64+0xe2/0x570\n? exc_page_fault+0x66/0xb0\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\n</TASK>\nThis fix may be combined with another one in the ethtool subsystem:\nhttps://lore.kernel.org/all/20260322075917.254874-1-alex.popov@linux.com/T/#u", "A flaw was found in the Linux kernel's virt_wifi component. A local user can exploit a race condition during the unregistration of a virt_wifi network device, where its parent pointer might refer to freed memory during ethtool operations. This use-after-free vulnerability can lead to system instability or a denial of service." ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-31695\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-31695\nhttps://lore.kernel.org/linux-cve-announce/2026050141-CVE-2026-31695-813b@gregkh/T" ],
  "name" : "CVE-2026-31695",
  "csaw" : false
}