[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2026012352-CVE-2026-22995-7465@gregkh>
Date: Fri, 23 Jan 2026 16:25:06 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2026-22995: ublk: fix use-after-free in ublk_partition_scan_work
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ublk: fix use-after-free in ublk_partition_scan_work
A race condition exists between the async partition scan work and device
teardown that can lead to a use-after-free of ub->ub_disk:
1. ublk_ctrl_start_dev() schedules partition_scan_work after add_disk()
2. ublk_stop_dev() calls ublk_stop_dev_unlocked() which does:
- del_gendisk(ub->ub_disk)
- ublk_detach_disk() sets ub->ub_disk = NULL
- put_disk() which may free the disk
3. The worker ublk_partition_scan_work() then dereferences ub->ub_disk
leading to UAF
Fix this by using ublk_get_disk()/ublk_put_disk() in the worker to hold
a reference to the disk during the partition scan. The spinlock in
ublk_get_disk() synchronizes with ublk_detach_disk() ensuring the worker
either gets a valid reference or sees NULL and exits early.
Also change flush_work() to cancel_work_sync() to avoid running the
partition scan work unnecessarily when the disk is already detached.
The Linux kernel CVE team has assigned CVE-2026-22995 to this issue.
Affected and fixed versions
===========================
Issue introduced in 6.18.4 with commit 63dfbcd59b4b823eac4441efff10b1c303c8f49f and fixed in 6.18.6 with commit 72e28774e9644c2bdbb4920842fbf77103a15a85
Issue introduced in 6.19-rc4 with commit 7fc4da6a304bdcd3de14fc946dc2c19437a9cc5a and fixed in 6.19-rc5 with commit f0d385f6689f37a2828c686fb279121df006b4cb
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2026-22995
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/block/ublk_drv.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/72e28774e9644c2bdbb4920842fbf77103a15a85
https://git.kernel.org/stable/c/f0d385f6689f37a2828c686fb279121df006b4cb
Powered by blists - more mailing lists