Impact
The race condition between asynchronous partition‑scan work and device teardown in the Linux kernel’s ublk subsystem results in a use‑after‑free of the ub_disk pointer. This memory corruption flaw (CWE‑416) can cause a kernel fault, system crash, or, in a rare case, execution of arbitrary code with kernel privileges.
Affected Systems
The flaw exists in the Linux kernel’s ublk component. All kernel releases that include the race, notably 6.19‑rc4 and earlier, are affected. System‑level or kernel‑level updates that incorporate the patch resolve the issue.
Risk and Exploitability
The CVSS score is 7.8, indicating high severity, while the EPSS score is below 1 %, indicating a low current probability of exploitation. It is not listed in the CISA KEV catalog. The likely attack vector is inference: a local or privileged user could trigger a ublk device partition scan while simultaneously tearing down the device, which leads to the race and the subsequent use‑after‑free. This inference is based on the race description rather than explicit attack details.
OpenCVE Enrichment