In the Linux kernel, the following vulnerability has been resolved:
uacce: ensure safe queue release with state management
Directly calling `put_queue` carries risks since it cannot
guarantee that resources of `uacce_queue` have been fully released
beforehand. So adding a `stop_queue` operation for the
UACCE_CMD_PUT_Q command and leaving the `put_queue` operation to
the final resource release ensures safety.
Queue states are defined as follows:
- UACCE_Q_ZOMBIE: Initial state
- UACCE_Q_INIT: After opening `uacce`
- UACCE_Q_STARTED: After `start` is issued via `ioctl`
When executing `poweroff -f` in virt while accelerator are still
working, `uacce_fops_release` and `uacce_remove` may execute
concurrently. This can cause `uacce_put_queue` within
`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add
state checks to prevent accessing freed pointers.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2026, 21:28
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/26c08dabe5475d99a13f353d8dd70e518de45663 - Patch | |
| References | () https://git.kernel.org/stable/c/336fb41a186e7c0415ae94fec9e23d1f04b87483 - Patch | |
| References | () https://git.kernel.org/stable/c/43f233eb6e7b9d88536881a9bc43726d0e34800d - Patch | |
| References | () https://git.kernel.org/stable/c/47634d70073890c9c37e39ab4ff93d4b585b028a - Patch | |
| References | () https://git.kernel.org/stable/c/8b57bf1d3b1db692f34bce694a03e41be79f6016 - Patch | |
| References | () https://git.kernel.org/stable/c/92e4f11e29b98ef424ff72d6371acac03e5d973c - Patch | |
| References | () https://git.kernel.org/stable/c/b457abeb5d962db88aaf60e249402fd3073dbfab - Patch | |
| CWE | CWE-476 | |
| First Time |
Linux
Linux linux Kernel |
|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 17:16
Updated : 2026-03-13 21:28
NVD link : CVE-2026-23063
Mitre link : CVE-2026-23063
CVE.ORG link : CVE-2026-23063
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
