Description
In the Linux kernel, the following vulnerability has been resolved:

serial: caif: hold tty->link reference in ldisc_open and ser_release

A reproducer triggers a KASAN slab-use-after-free in pty_write_room()
when caif_serial's TX path calls tty_write_room(). The faulting access
is on tty->link->port.

Hold an extra kref on tty->link for the lifetime of the caif_serial line
discipline: get it in ldisc_open() and drop it in ser_release(), and
also drop it on the ldisc_open() error path.

With this change applied, the reproducer no longer triggers the UAF in
my testing.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw exists in the Linux kernel’s serial CAIF (Control and Adaptation Interface for FUSS) line discipline. The missing reference to tty->link during ldisc_open and ser_release causes a KASAN-detected UAF when caif_serial’s TX path invokes tty_write_room, potentially enabling an attacker to corrupt kernel memory or execute arbitrary code with elevated privileges. The weakness is a classic use‑after‑free error (CWE‑416) and involves memory reference misuse (CWE‑911).

Affected Systems

The affected product is the Linux kernel. All kernel releases prior to the application of the fix that introduces an extra kref on tty->link are vulnerable. No specific version range is listed; any kernel containing the buggy caif_serial line discipline may be impacted.

Risk and Exploitability

No EPSS score is available, and the vulnerability is not listed in CISA KEV, but the nature of the flaw suggests a high impact if successfully exploited because it occurs in kernel space and can lead to arbitrary code execution. Without a CVSS score the exact severity is unknown, but the potential for kernel compromise warrants immediate attention. The likely attack vector involves interacting with a serial CAIF device (e.g., from user space), which could be achieved locally or remotely if the device is exposed over a network or shared environment.

Generated by OpenCVE AI on May 9, 2026 at 13:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that includes the kref fix for caif_serial line discipline.
  • If an update cannot be applied immediately, reboot the system to unload any stale caif_serial modules that may still reference freed memory.
  • If the CAIF serial device is not required, disable it by removing the corresponding module or restricting access permissions to mitigate risk.
  • Monitor kernel logs for KASAN or other memory corruption messages to detect unsuccessful exploitation attempts.

Generated by OpenCVE AI on May 9, 2026 at 13:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 12:15:00 +0000


Fri, 08 May 2026 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: serial: caif: hold tty->link reference in ldisc_open and ser_release A reproducer triggers a KASAN slab-use-after-free in pty_write_room() when caif_serial's TX path calls tty_write_room(). The faulting access is on tty->link->port. Hold an extra kref on tty->link for the lifetime of the caif_serial line discipline: get it in ldisc_open() and drop it in ser_release(), and also drop it on the ldisc_open() error path. With this change applied, the reproducer no longer triggers the UAF in my testing.
Title serial: caif: hold tty->link reference in ldisc_open and ser_release
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:21.997Z

Reserved: 2026-05-01T14:12:56.010Z

Link: CVE-2026-43458

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:58.630

Modified: 2026-05-08T15:16:58.630

Link: CVE-2026-43458

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43458 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T13:45:34Z

Weaknesses