CVE-2026-31582
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
24/04/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
hwmon: (powerz) Fix use-after-free on USB disconnect<br />
<br />
After powerz_disconnect() frees the URB and releases the mutex, a<br />
subsequent powerz_read() call can acquire the mutex and call<br />
powerz_read_data(), which dereferences the freed URB pointer.<br />
<br />
Fix by:<br />
- Setting priv->urb to NULL in powerz_disconnect() so that<br />
powerz_read_data() can detect the disconnected state.<br />
- Adding a !priv->urb check at the start of powerz_read_data()<br />
to return -ENODEV on a disconnected device.<br />
- Moving usb_set_intfdata() before hwmon registration so the<br />
disconnect handler can always find the priv pointer.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.83 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (including) | 7.0.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/08e57f5e1a9067d5fbf33993aa7f51d60b3d13a4
- https://git.kernel.org/stable/c/61f2aa23b0ce8d7aa5071ed25a7471e246a4fdd4
- https://git.kernel.org/stable/c/7003ae4810ca83f0ddca85b768500e313c4b998c
- https://git.kernel.org/stable/c/9e1b798257f96d2e2a2639830eb71add545ce749
- https://git.kernel.org/stable/c/c78e1d4e48f23792adaa7c94251e22b0d9700a39



