CVE-2026-31673

Source
https://cve.org/CVERecord?id=CVE-2026-31673
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31673.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-31673
Downstream
Published
2026-04-25T08:46:49.246Z
Modified
2026-04-26T04:22:21.190533Z
Summary
af_unix: read UNIX_DIAG_VFS data under unix_state_lock
Details

In the Linux kernel, the following vulnerability has been resolved:

afunix: read UNIXDIAGVFS data under unixstate_lock

Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unixreleasesock() clears u->path under unixstatelock() and drops the path reference after unlocking.

Read the inode and device numbers for UNIXDIAGVFS while holding unixstatelock(), then emit the netlink attribute after dropping the lock.

This keeps the VFS data stable while the reply is being built.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31673.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5f7b0569460b7d8d01ca776430a00505a68b7584
Fixed
0c739f3785f84af695952c2bac8be2f45082c9b8
Fixed
900a4e0910e98b8caef117d5df00471fa438dcf9
Fixed
bdf206e740bf2919d818f132c8c9cc7ed91d11c0
Fixed
39897df386376912d561d4946499379effa1e7ef

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31673.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.3.0
Fixed
6.12.83
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.24
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.14

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31673.json"