CVE-2026-31673

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path under unix_state_lock() and drops the path reference after unlocking. Read the inode and device numbers for UNIX_DIAG_VFS while holding unix_state_lock(), then emit the netlink attribute after dropping the lock. This keeps the VFS data stable while the reply is being built.
CVSS

No CVSS.

Configurations

No configuration.

History

25 Apr 2026, 09:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-25 09:16

Updated : 2026-04-25 09:16


NVD link : CVE-2026-31673

Mitre link : CVE-2026-31673

CVE.ORG link : CVE-2026-31673


JSON object : View

Products Affected

No product.

CWE

No CWE.