CVE-2026-31680

Source
https://cve.org/CVERecord?id=CVE-2026-31680
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31680.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-31680
Downstream
Published
2026-04-25T08:46:56.807Z
Modified
2026-04-26T04:22:21.568065Z
Summary
net: ipv6: flowlabel: defer exclusive option free until RCU teardown
Details

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: flowlabel: defer exclusive option free until RCU teardown

ip6fl_seq_show() walks the global flowlabel hash under the seq-file RCU read-side lock and prints fl->opt->opt_nflen when an option block is present.

Exclusive flowlabels currently free fl->opt as soon as fl->users drops to zero in fl_release(). However, the surrounding struct ip6_flowlabel remains visible in the global hash table until later garbage collection removes it and fl_free_rcu() finally tears it down.

A concurrent /proc/net/ip6_flowlabel reader can therefore race that early kfree() and dereference freed option state, triggering a crash in ip6fl_seq_show().

Fix this by keeping fl->opt alive until fl_free_rcu(). That matches the lifetime already required for the enclosing flowlabel while readers can still reach it under RCU.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31680.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d3aedd5ebd4b0b925b0bcda548066803e1318499
Fixed
4b6798024f7b2d535f3db1002c760143cdbd1bd3
Fixed
3c54b66c83fb8fcbde8e6a7bf90b65856e39f827
Fixed
5a6b15f861b7c1304949e3350d23490a5fe429fd
Fixed
6c7fbdb8ffde6413640de7cfbd7c976c353e89f8
Fixed
8027964931785cb73d520ac70a342a3dc16c249b
Fixed
414726b69921fe6355ae453f5b35e68dd078342a
Fixed
572ce62778519a7d4d1c15f55dd2e45a474133c4
Fixed
9ca562bb8e66978b53028fa32b1a190708e6a091

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31680.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.9.0
Fixed
5.10.253
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.203
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.168
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.134
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.81
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.22
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31680.json"