CVE-2026-31680
Use-After-Free in Linux Kernel IPv6 Flowlabel Causes Crash
Publication date: 2026-04-25
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's IPv6 flowlabel handling. Specifically, it involves a race condition where an option block associated with a flowlabel is freed too early. The function ip6fl_seq_show() reads flowlabel options under a read-copy-update (RCU) lock, but the option block (fl->opt) is freed as soon as the user count drops to zero, even though the flowlabel structure remains visible in the global hash table until later garbage collection. This can cause a concurrent reader of /proc/net/ip6_flowlabel to access freed memory, leading to a crash.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a potential system crash caused by a use-after-free condition when reading IPv6 flowlabel information. This can lead to denial of service (DoS) as the kernel may crash or become unstable when a concurrent process accesses freed memory.