Description
In the Linux kernel, the following vulnerability has been resolved:

nvdimm/bus: Fix potential use after free in asynchronous initialization

Dingisoul with KASAN reports a use after free if device_add() fails in
nd_async_device_register().

Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while
scheduling async init") correctly added a reference on the parent device
to be held until asynchronous initialization was complete. However, if
device_add() results in an allocation failure the ref count of the
device drops to 0 prior to the parent pointer being accessed. Thus
resulting in use after free.

The bug bot AI correctly identified the fix. Save a reference to the
parent pointer to be used to drop the parent reference regardless of the
outcome of device_add().
Published: 2026-04-03
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential use-after-free during NVDIMM device asynchronous initialization in the Linux kernel
Action: Apply patch
AI Analysis

Impact

An attacker could trigger a use-after-free violation by causing device_add() to fail during the asynchronous initialization of a non-volatile memory device. The flaw arises because the parent device reference is released before the child device is fully initialized, leaving a dangling pointer that can be dereferenced. This denial-of-service vector undermines the stability and correctness of the kernel, potentially leading to kernel panics or loss of service for systems relying on NVDIMM devices.

Affected Systems

The vulnerability applies to the Linux kernel itself. All installations where the kernel includes the nvdimm/bus subsystem and is susceptible to asynchronous device registration would be at risk. No specific kernel version range is provided in the data, so a careful review of release notes is needed to confirm exposure.

Risk and Exploitability

The CVSS score of 4.7 places the issue in the medium severity range. Exploitation seems plausible only if an attacker can influence the creation of a non-volatile memory device whose addition fails, which suggests a local or privileged attack surface rather than a remote one. With an EPSS score of less than 1% and no listing in CISA’s KEV catalog, it is unlikely to be widely exploited at this time, but the inherent use-after-free flaw warrants prompt remediation.

Generated by OpenCVE AI on April 7, 2026 at 09:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes commit b6eae0f61db2 in libnvdimm (or later) which holds a reference on the parent during async initialization.

Generated by OpenCVE AI on April 7, 2026 at 09:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-911
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: nvdimm/bus: Fix potential use after free in asynchronous initialization Dingisoul with KASAN reports a use after free if device_add() fails in nd_async_device_register(). Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while scheduling async init") correctly added a reference on the parent device to be held until asynchronous initialization was complete. However, if device_add() results in an allocation failure the ref count of the device drops to 0 prior to the parent pointer being accessed. Thus resulting in use after free. The bug bot AI correctly identified the fix. Save a reference to the parent pointer to be used to drop the parent reference regardless of the outcome of device_add().
Title nvdimm/bus: Fix potential use after free in asynchronous initialization
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:59:18.870Z

Reserved: 2026-03-09T15:48:24.085Z

Link: CVE-2026-31399

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:38.410

Modified: 2026-04-18T09:16:29.987

Link: CVE-2026-31399

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-31399 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:26Z

Weaknesses