In the Linux kernel, the following vulnerability has been resolved:
af_unix: read UNIX_DIAG_VFS data under unix_state_lock
Exact UNIX diag lookups hold a reference to the socket, but not to
u->path. Meanwhile, unix_release_sock() clears u->path under
unix_state_lock() and drops the path reference after unlocking.
Read the inode and device numbers for UNIX_DIAG_VFS while holding
unix_state_lock(), then emit the netlink attribute after dropping the
lock.
This keeps the VFS data stable while the reply is being built.
CVSS
No CVSS.
References
Configurations
No configuration.
History
25 Apr 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-25 09:16
Updated : 2026-04-25 09:16
NVD link : CVE-2026-31673
Mitre link : CVE-2026-31673
CVE.ORG link : CVE-2026-31673
JSON object : View
Products Affected
No product.
CWE
No CWE.
