CVE-2026-31399

Source
https://cve.org/CVERecord?id=CVE-2026-31399
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31399.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-31399
Downstream
Published
2026-04-03T15:16:03.246Z
Modified
2026-04-14T03:47:18.655036Z
Summary
nvdimm/bus: Fix potential use after free in asynchronous initialization
Details

In the Linux kernel, the following vulnerability has been resolved:

nvdimm/bus: Fix potential use after free in asynchronous initialization

Dingisoul with KASAN reports a use after free if deviceadd() fails in ndasyncdeviceregister().

Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while scheduling async init") correctly added a reference on the parent device to be held until asynchronous initialization was complete. However, if device_add() results in an allocation failure the ref count of the device drops to 0 prior to the parent pointer being accessed. Thus resulting in use after free.

The bug bot AI correctly identified the fix. Save a reference to the parent pointer to be used to drop the parent reference regardless of the outcome of device_add().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31399.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b6eae0f61db27748606cc00dafcfd1e2c032f0a5
Fixed
9a0fb16ba5b372465a3a1ecd761c6fa911a4ab4d
Fixed
e48bf8f1d2b12c1c5ba1f609edbd4cde5dadc20e
Fixed
2c638259ad750833fd46a0cf57672a618542d84c
Fixed
a226e5b49e5fe8c98b14f8507de670189d191348
Fixed
84af19855d1abdee3c9d57c0684e2868e391793c
Fixed
a8aec14230322ed8f1e8042b6d656c1631d41163
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
8954771abdea5c34280870e35592c7226a816d95
Last affected
3e63a7f25cc85d3d3e174b9b0e3489ebb7eaf4ab
Last affected
1490de2bb0836fc0631c04d0559fdf81545b672f
Last affected
e31a8418c8df7e6771414f99ed3d95ba8aca4e05
Last affected
4f1a55a4f990016406147cf3e0c9487bf83e50f0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31399.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
6.1.167
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.78
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.20
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31399.json"