Impact
The vulnerability arose in the Linux kernel’s af_unix module, where a diagnostic request could read inode and device numbers of a UNIX socket before the socket’s path reference was released, exposing VFS data. The fix ensures the data is read while the unix_state_lock mutex is held and the netlink reply is constructed only after the lock is released, eliminating the race condition and protecting against data leakage. Based on the description, it is inferred that the race might lead to unstable kernel behavior, though this is not explicitly mentioned.
Affected Systems
All releases of the Linux kernel containing the unfixed af_unix code are affected, as the flaw resides in the core kernel source. The CNA indicates the vendor as Linux:Linux, and no specific version ranges are listed, so every kernel version prior to the patch is considered vulnerable.
Risk and Exploitability
The CVSS score of 7.8 signals a serious risk, yet the EPSS score of less than 1% suggests that exploitation is unlikely under current conditions, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local: an attacker with access to the same host could send a netlink diagnostic request to the kernel, potentially exposing VFS metadata. Based on the description, the impact might include confidentiality compromise, but a direct correlation to kernel crashes is not explicitly stated.
OpenCVE Enrichment
Debian DSA