CVE-2026-31678

medium

Description

In the Linux kernel, the following vulnerability has been resolved: openvswitch: defer tunnel netdev_put to RCU release ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already detached the device. Dropping the netdev reference in destroy can race with concurrent readers that still observe vport->dev. Do not release vport->dev in ovs_netdev_tunnel_destroy(). Instead, let vport_netdev_free() drop the reference from the RCU callback, matching the non-tunnel destroy path and avoiding additional synchronization under RTNL.

References

https://git.kernel.org/stable/c/bbe7bd722bfaea36aab3da6cc60fb4a05c644643

https://git.kernel.org/stable/c/b8c56a3fc5d879c0928f207a756b0f067f06c6a8

https://git.kernel.org/stable/c/9d56aced21fb9c104e8a3f3be9b21fbafe448ffc

https://git.kernel.org/stable/c/98b726ab5e2a4811e27c28e4d041f75bba147eab

https://git.kernel.org/stable/c/6931d21f87bc6d657f145798fad0bf077b82486c

https://git.kernel.org/stable/c/42f0d3d81209654c08ffdde5a34b9b92d2645896

Details

Source: Mitre, NVD

Published: 2026-04-25

Updated: 2026-04-25

Risk Information

CVSS v2

Base Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium