In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix use-after-free on disconnect The vub300 driver maintains an explicit reference count for the controller and its driver data and the last reference can in theory be dropped after the driver has been unbound. This specifically means that the controller allocation must not be device managed as that can lead to use-after-free. Note that the lifetime is currently also incorrectly tied the parent USB device rather than interface, which can lead to memory leaks if the driver is unbound without its device being physically disconnected (e.g. on probe deferral). Fix both issues by reverting to non-managed allocation of the controller.
Use CWE-416, Linux vendor hub and Linux Kernel product page to widen CVE-2026-31650 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-7363, CVE-2026-7361 and CVE-2026-7359 for nearby disclosures in the same product family.