PT-2026-30182 · Linux · Linux Kernel

Dingisoul

·

Published

2026-03-06

·

Updated

2026-04-20

·

CVE-2026-31399

CVSS v3.1

7.8

High

VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description The Linux kernel contained a use-after-free issue within the nd async device register() function during asynchronous initialization. This occurred when device add() failed, leading to a drop in the device reference count to zero before the parent pointer was accessed. The issue was identified using KASAN by Dingisoul and addressed by holding a reference to the parent pointer to ensure it remains valid regardless of the outcome of device add().
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Use After Free

Weakness Enumeration

Related Identifiers

BDU:2026-05768
CVE-2026-31399
ECHO-9792-2894-348B
OESA-2026-1946
OESA-2026-1947
OESA-2026-1948

Affected Products

Linux Kernel