CVE-2026-31673

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/04/2026
Last modified:
06/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> af_unix: read UNIX_DIAG_VFS data under unix_state_lock<br /> <br /> Exact UNIX diag lookups hold a reference to the socket, but not to<br /> u-&gt;path. Meanwhile, unix_release_sock() clears u-&gt;path under<br /> unix_state_lock() and drops the path reference after unlocking.<br /> <br /> Read the inode and device numbers for UNIX_DIAG_VFS while holding<br /> unix_state_lock(), then emit the netlink attribute after dropping the<br /> lock.<br /> <br /> This keeps the VFS data stable while the reply is being built.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.3 (including) 6.6.136 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.83 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.14 (excluding)
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*