๐Ÿ” CVE Alert

CVE-2026-31650

UNKNOWN 0.0

mmc: vub300: fix use-after-free on disconnect

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix use-after-free on disconnect The vub300 driver maintains an explicit reference count for the controller and its driver data and the last reference can in theory be dropped after the driver has been unbound. This specifically means that the controller allocation must not be device managed as that can lead to use-after-free. Note that the lifetime is currently also incorrectly tied the parent USB device rather than interface, which can lead to memory leaks if the driver is unbound without its device being physically disconnected (e.g. on probe deferral). Fix both issues by reverting to non-managed allocation of the controller.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
dcfdd698dc521c6046e9b80c16281575efb25d23 < ea7468f61be033f4e18b95f2912010ed1d175d75 dcfdd698dc521c6046e9b80c16281575efb25d23 < ef0448c569b37ceabdd038e9faa311e5179127b0 dcfdd698dc521c6046e9b80c16281575efb25d23 < 8f4d20a710225ec7a565f6a0459862d3b1f32330
Linux / Linux
6.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ea7468f61be033f4e18b95f2912010ed1d175d75 git.kernel.org: https://git.kernel.org/stable/c/ef0448c569b37ceabdd038e9faa311e5179127b0 git.kernel.org: https://git.kernel.org/stable/c/8f4d20a710225ec7a565f6a0459862d3b1f32330