CVE-2026-31399

Published: Apr 03, 2026 Last Modified: Apr 03, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

nvdimm/bus: Fix potential use after free in asynchronous initialization

Dingisoul with KASAN reports a use after free if device_add() fails in
nd_async_device_register().

Commit b6eae0f61db2 ('libnvdimm: Hold reference on parent while
scheduling async init') correctly added a reference on the parent device
to be held until asynchronous initialization was complete. However, if
device_add() results in an allocation failure the ref count of the
device drops to 0 prior to the parent pointer being accessed. Thus
resulting in use after free.

The bug bot AI correctly identified the fix. Save a reference to the
parent pointer to be used to drop the parent reference regardless of the
outcome of device_add().

https://git.kernel.org/stable/c/2c638259ad750833fd46a0cf57672a618542d84c
https://git.kernel.org/stable/c/84af19855d1abdee3c9d57c0684e2868e391793c
https://git.kernel.org/stable/c/9a0fb16ba5b372465a3a1ecd761c6fa911a4ab4d
https://git.kernel.org/stable/c/a226e5b49e5fe8c98b14f8507de670189d191348
https://git.kernel.org/stable/c/a8aec14230322ed8f1e8042b6d656c1631d41163
https://git.kernel.org/stable/c/e48bf8f1d2b12c1c5ba1f609edbd4cde5dadc20e