CVE-2026-31673
af_unix: read UNIX_DIAG_VFS data under unix_state_lock
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path under unix_state_lock() and drops the path reference after unlocking. Read the inode and device numbers for UNIX_DIAG_VFS while holding unix_state_lock(), then emit the netlink attribute after dropping the lock. This keeps the VFS data stable while the reply is being built.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
5f7b0569460b7d8d01ca776430a00505a68b7584 < 0c739f3785f84af695952c2bac8be2f45082c9b8 5f7b0569460b7d8d01ca776430a00505a68b7584 < 900a4e0910e98b8caef117d5df00471fa438dcf9 5f7b0569460b7d8d01ca776430a00505a68b7584 < bdf206e740bf2919d818f132c8c9cc7ed91d11c0 5f7b0569460b7d8d01ca776430a00505a68b7584 < 39897df386376912d561d4946499379effa1e7ef
Linux / Linux
3.3
References
git.kernel.org: https://git.kernel.org/stable/c/0c739f3785f84af695952c2bac8be2f45082c9b8 git.kernel.org: https://git.kernel.org/stable/c/900a4e0910e98b8caef117d5df00471fa438dcf9 git.kernel.org: https://git.kernel.org/stable/c/bdf206e740bf2919d818f132c8c9cc7ed91d11c0 git.kernel.org: https://git.kernel.org/stable/c/39897df386376912d561d4946499379effa1e7ef