{"id":"CVE-2026-31678","summary":"openvswitch: defer tunnel netdev_put to RCU release","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: defer tunnel netdev_put to RCU release\n\novs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already\ndetached the device. Dropping the netdev reference in destroy can race\nwith concurrent readers that still observe vport-\u003edev.\n\nDo not release vport-\u003edev in ovs_netdev_tunnel_destroy(). Instead, let\nvport_netdev_free() drop the reference from the RCU callback, matching\nthe non-tunnel destroy path and avoiding additional synchronization\nunder RTNL.","modified":"2026-04-26T04:22:21.355721Z","published":"2026-04-25T08:46:54.476Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31678.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/42f0d3d81209654c08ffdde5a34b9b92d2645896"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6931d21f87bc6d657f145798fad0bf077b82486c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/98b726ab5e2a4811e27c28e4d041f75bba147eab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9d56aced21fb9c104e8a3f3be9b21fbafe448ffc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8c56a3fc5d879c0928f207a756b0f067f06c6a8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bbe7bd722bfaea36aab3da6cc60fb4a05c644643"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31678.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31678"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a9020fde67a6eb77f8130feff633189f99264db1"},{"fixed":"9d56aced21fb9c104e8a3f3be9b21fbafe448ffc"},{"fixed":"42f0d3d81209654c08ffdde5a34b9b92d2645896"},{"fixed":"bbe7bd722bfaea36aab3da6cc60fb4a05c644643"},{"fixed":"98b726ab5e2a4811e27c28e4d041f75bba147eab"},{"fixed":"b8c56a3fc5d879c0928f207a756b0f067f06c6a8"},{"fixed":"6931d21f87bc6d657f145798fad0bf077b82486c"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31678.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.3.0"},{"fixed":"6.1.168"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.131"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.80"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.21"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31678.json"}}],"schema_version":"1.7.5"}