CVE-2026-22995
Linux Debian vulnerability analysis and mitigation

In the Linux kernel, the following vulnerability has been resolved:

ublk: fix use-after-free in ublk_partition_scan_work

A race condition exists between the async partition scan work and device teardown that can lead to a use-after-free of ub->ub_disk:

  1. ublk_ctrl_start_dev() schedules partition_scan_work after add_disk()
  2. ublk_stop_dev() calls ublk_stop_dev_unlocked() which does:
    • del_gendisk(ub->ub_disk)
    • ublk_detach_disk() sets ub->ub_disk = NULL
    • put_disk() which may free the disk
  3. The worker ublk_partition_scan_work() then dereferences ub->ub_disk leading to UAF

Fix this by using ublk_get_disk()/ublk_put_disk() in the worker to hold a reference to the disk during the partition scan. The spinlock in ublk_get_disk() synchronizes with ublk_detach_disk() ensuring the worker either gets a valid reference or sees NULL and exits early.

Also change flush_work() to cancel_work_sync() to avoid running the partition scan work unnecessarily when the disk is already detached.


SourceNVD

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-41445HIGH8.7
  • Linux DebianLinux Debian
  • kissfft
NoNoApr 20, 2026
CVE-2026-28684MEDIUM6.6
  • Linux DebianLinux Debian
  • python-dotenv
NoNoApr 20, 2026
CVE-2026-6654MEDIUM5.1
  • RustRust
  • thin-vec
NoYesApr 20, 2026
CVE-2026-3219MEDIUM4.6
  • Linux DebianLinux Debian
  • python-pip
NoNoApr 20, 2026
CVE-2026-5958LOW2.1
  • Linux DebianLinux Debian
  • sed
NoNoApr 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management