CVE-2026-31399
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
03/04/2026
Última modificación:
03/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nvdimm/bus: Fix potential use after free in asynchronous initialization<br />
<br />
Dingisoul with KASAN reports a use after free if device_add() fails in<br />
nd_async_device_register().<br />
<br />
Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while<br />
scheduling async init") correctly added a reference on the parent device<br />
to be held until asynchronous initialization was complete. However, if<br />
device_add() results in an allocation failure the ref count of the<br />
device drops to 0 prior to the parent pointer being accessed. Thus<br />
resulting in use after free.<br />
<br />
The bug bot AI correctly identified the fix. Save a reference to the<br />
parent pointer to be used to drop the parent reference regardless of the<br />
outcome of device_add().
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/2c638259ad750833fd46a0cf57672a618542d84c
- https://git.kernel.org/stable/c/84af19855d1abdee3c9d57c0684e2868e391793c
- https://git.kernel.org/stable/c/9a0fb16ba5b372465a3a1ecd761c6fa911a4ab4d
- https://git.kernel.org/stable/c/a226e5b49e5fe8c98b14f8507de670189d191348
- https://git.kernel.org/stable/c/a8aec14230322ed8f1e8042b6d656c1631d41163
- https://git.kernel.org/stable/c/e48bf8f1d2b12c1c5ba1f609edbd4cde5dadc20e



