-

CVE-2026-31399

nvdimm/bus: Fix potential use after free in asynchronous initialization

In the Linux kernel, the following vulnerability has been resolved:

nvdimm/bus: Fix potential use after free in asynchronous initialization

Dingisoul with KASAN reports a use after free if device_add() fails in
nd_async_device_register().

Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while
scheduling async init") correctly added a reference on the parent device
to be held until asynchronous initialization was complete.  However, if
device_add() results in an allocation failure the ref count of the
device drops to 0 prior to the parent pointer being accessed.  Thus
resulting in use after free.

The bug bot AI correctly identified the fix.  Save a reference to the
parent pointer to be used to drop the parent reference regardless of the
outcome of device_add().
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < 6fc36c2a925ceaba203eb13d75a8f0879a2c121b
Status affected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < a36cf138500e56f50db9f9a33222df6969b38326
Status affected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < 9a0fb16ba5b372465a3a1ecd761c6fa911a4ab4d
Status affected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < e48bf8f1d2b12c1c5ba1f609edbd4cde5dadc20e
Status affected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < 2c638259ad750833fd46a0cf57672a618542d84c
Status affected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < a226e5b49e5fe8c98b14f8507de670189d191348
Status affected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < 84af19855d1abdee3c9d57c0684e2868e391793c
Status affected
Version b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Version < a8aec14230322ed8f1e8042b6d656c1631d41163
Status affected
Version 8954771abdea5c34280870e35592c7226a816d95
Status affected
Version 3e63a7f25cc85d3d3e174b9b0e3489ebb7eaf4ab
Status affected
Version 1490de2bb0836fc0631c04d0559fdf81545b672f
Status affected
Version e31a8418c8df7e6771414f99ed3d95ba8aca4e05
Status affected
Version 4f1a55a4f990016406147cf3e0c9487bf83e50f0
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.20
Status affected
Version 0
Version < 4.20
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.20
Status unaffected
Version <= 6.19.*
Version 6.19.10
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.102
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.