af_unix: read UNIX_DIAG_VFS data under unix_state_lock
Summary
| CVE | CVE-2026-31673 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-25 09:16:00 UTC |
| Updated | 2026-04-25 09:16:00 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
af_unix: read UNIX_DIAG_VFS data under unix_state_lock
Exact UNIX diag lookups hold a reference to the socket, but not to
u->path. Meanwhile, unix_release_sock() clears u->path under
unix_state_lock() and drops the path reference after unlocking.
Read the inode and device numbers for UNIX_DIAG_VFS while holding
unix_state_lock(), then emit the netlink attribute after dropping the
lock.
This keeps the VFS data stable while the reply is being built. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 5f7b0569460b7d8d01ca776430a00505a68b7584 0c739f3785f84af695952c2bac8be2f45082c9b8 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5f7b0569460b7d8d01ca776430a00505a68b7584 900a4e0910e98b8caef117d5df00471fa438dcf9 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5f7b0569460b7d8d01ca776430a00505a68b7584 bdf206e740bf2919d818f132c8c9cc7ed91d11c0 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5f7b0569460b7d8d01ca776430a00505a68b7584 39897df386376912d561d4946499379effa1e7ef git |
Not specified |
| CNA |
Linux |
Linux |
affected 3.3 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 3.3 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.83 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.24 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.14 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/900a4e0910e98b8caef117d5df00471fa438dcf9 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0c739f3785f84af695952c2bac8be2f45082c9b8 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/39897df386376912d561d4946499379effa1e7ef |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/bdf206e740bf2919d818f132c8c9cc7ed91d11c0 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.