#VU124885 Use-after-free in Linux kernel - CVE-2026-31399

 

#VU124885 Use-after-free in Linux kernel - CVE-2026-31399

Published: April 6, 2026


Vulnerability identifier: #VU124885
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-31399
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to cause a denial of service.

The vulnerability exists due to use-after-free in nd_async_device_register() when handling asynchronous device initialization after device_add() failure. A local user can trigger the vulnerable code path to cause a denial of service.

The issue occurs because the parent pointer may be accessed after the device reference count drops to zero. No user interaction is required.


Remediation

Install security update from vendor's repository.

External links