๐Ÿ” CVE Alert

CVE-2026-22995

UNKNOWN 0.0

ublk: fix use-after-free in ublk_partition_scan_work

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ublk_partition_scan_work A race condition exists between the async partition scan work and device teardown that can lead to a use-after-free of ub->ub_disk: 1. ublk_ctrl_start_dev() schedules partition_scan_work after add_disk() 2. ublk_stop_dev() calls ublk_stop_dev_unlocked() which does: - del_gendisk(ub->ub_disk) - ublk_detach_disk() sets ub->ub_disk = NULL - put_disk() which may free the disk 3. The worker ublk_partition_scan_work() then dereferences ub->ub_disk leading to UAF Fix this by using ublk_get_disk()/ublk_put_disk() in the worker to hold a reference to the disk during the partition scan. The spinlock in ublk_get_disk() synchronizes with ublk_detach_disk() ensuring the worker either gets a valid reference or sees NULL and exits early. Also change flush_work() to cancel_work_sync() to avoid running the partition scan work unnecessarily when the disk is already detached.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 23, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
63dfbcd59b4b823eac4441efff10b1c303c8f49f < 72e28774e9644c2bdbb4920842fbf77103a15a85 7fc4da6a304bdcd3de14fc946dc2c19437a9cc5a < f0d385f6689f37a2828c686fb279121df006b4cb
Linux / Linux
6.18.4 < 6.18.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/72e28774e9644c2bdbb4920842fbf77103a15a85 git.kernel.org: https://git.kernel.org/stable/c/f0d385f6689f37a2828c686fb279121df006b4cb