CVE-2026-31399
EUVD-2026-1878003.04.2026, 16:16
In the Linux kernel, the following vulnerability has been resolved:
nvdimm/bus: Fix potential use after free in asynchronous initialization
Dingisoul with KASAN reports a use after free if device_add() fails in
nd_async_device_register().
Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while
scheduling async init") correctly added a reference on the parent device
to be held until asynchronous initialization was complete. However, if
device_add() results in an allocation failure the ref count of the
device drops to 0 prior to the parent pointer being accessed. Thus
resulting in use after free.
The bug bot AI correctly identified the fix. Save a reference to the
parent pointer to be used to drop the parent reference regardless of the
outcome of device_add().EnginsightAffected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.4.164 ≤ 𝑥 < 4.5 |
| linux | linux_kernel | 4.9.137 ≤ 𝑥 < 4.10 |
| linux | linux_kernel | 4.14.81 ≤ 𝑥 < 4.15 |
| linux | linux_kernel | 4.18.19 ≤ 𝑥 < 4.19 |
| linux | linux_kernel | 4.19.2 ≤ 𝑥 < 5.10.253 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.203 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.167 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.130 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.78 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.18.20 |
| linux | linux_kernel | 6.19 ≤ 𝑥 < 6.19.10 |
| linux | linux_kernel | 7.0:rc1 |
| linux | linux_kernel | 7.0:rc2 |
| linux | linux_kernel | 7.0:rc3 |
| linux | linux_kernel | 7.0:rc4 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References