CVE-2026-31650

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
24/04/2026
Last modified:
27/04/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mmc: vub300: fix use-after-free on disconnect<br /> <br /> The vub300 driver maintains an explicit reference count for the<br /> controller and its driver data and the last reference can in theory be<br /> dropped after the driver has been unbound.<br /> <br /> This specifically means that the controller allocation must not be<br /> device managed as that can lead to use-after-free.<br /> <br /> Note that the lifetime is currently also incorrectly tied the parent USB<br /> device rather than interface, which can lead to memory leaks if the<br /> driver is unbound without its device being physically disconnected (e.g.<br /> on probe deferral).<br /> <br /> Fix both issues by reverting to non-managed allocation of the controller.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.17.1 (including) 6.18.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.13 (excluding)
cpe:2.3:o:linux:linux_kernel:6.17:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*