CVE-2026-31404Signal Handler Race Condition in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: NFSD: Defer sub-object cleanup in export put callbacks svc_export_put() calls path_put() and auth_domain_put() immediately when the last reference drops, before the RCU grace period. RCU readers in e_show() and c_show() access both ex_path (via seq_path/d_path) and ex_client->name (via seq_escape) without holding a reference. If cache_clean removes the entry and drops the last reference concurrently, the sub-objects are freed

Affected Packages3 packages

Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linuxc224edca7af028828e2ad866b61d731b5e72b46d2829e80d29b627886d12b5ea40856d56b516e67d+3
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

2
OSV
CVE-2026-31404: In the Linux kernel, the following vulnerability has been resolved: NFSD: Defer sub-object cleanup in export put callbacks svc_export_put() calls path2026-04-03
GHSA
GHSA-m9x4-x7j5-6v8x: In the Linux kernel, the following vulnerability has been resolved: NFSD: Defer sub-object cleanup in export put callbacks svc_export_put() calls pa2026-04-03

📋Vendor Advisories

2
Red Hat
kernel: NFSD: Defer sub-object cleanup in export put callbacks2026-04-03
Debian
CVE-2026-31404: linux - In the Linux kernel, the following vulnerability has been resolved: NFSD: Defer...2026

🕵️Threat Intelligence

1323
Wiz
CVE-2026-31389 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-23120 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-68319 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2022-50834 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-68307 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-31404 — Signal Handler Race Condition in Linux | cvebase