PT-2026-30182 · Linux · Linux Kernel
Dingisoul
·
Published
2026-03-06
·
Updated
2026-04-20
·
CVE-2026-31399
CVSS v3.1
7.8
High
| Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
The Linux kernel contained a use-after-free issue within the
nd async device register() function during asynchronous initialization. This occurred when device add() failed, leading to a drop in the device reference count to zero before the parent pointer was accessed. The issue was identified using KASAN by Dingisoul and addressed by holding a reference to the parent pointer to ensure it remains valid regardless of the outcome of device add().Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel