CVE-2026-23090

In the Linux kernel, the following vulnerability has been resolved: slimbus: core: fix device reference leak on report present Slimbus devices can be allocated dynamically upon reception of report-present messages. Make sure to drop the reference taken when looking up already registered devices. Note that this requires taking an extra reference in case the device has not yet been registered and has to be allocated.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

17 Mar 2026, 21:09

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/02b78bbfbafe49832e508079148cb87cdfa55825 - () https://git.kernel.org/stable/c/02b78bbfbafe49832e508079148cb87cdfa55825 - Patch
References () https://git.kernel.org/stable/c/2ddc09f6a0a221b1d91a7cbc8cc2cefdbd334fe6 - () https://git.kernel.org/stable/c/2ddc09f6a0a221b1d91a7cbc8cc2cefdbd334fe6 - Patch
References () https://git.kernel.org/stable/c/54de72a7aabc0749938d7a2833a0c1a5d3ed7ac9 - () https://git.kernel.org/stable/c/54de72a7aabc0749938d7a2833a0c1a5d3ed7ac9 - Patch
References () https://git.kernel.org/stable/c/6602bb4d1338e92b5838e50322b87697bdbd2ee0 - () https://git.kernel.org/stable/c/6602bb4d1338e92b5838e50322b87697bdbd2ee0 - Patch
References () https://git.kernel.org/stable/c/9391380eb91ea5ac792aae9273535c8da5b9aa01 - () https://git.kernel.org/stable/c/9391380eb91ea5ac792aae9273535c8da5b9aa01 - Patch
References () https://git.kernel.org/stable/c/948615429c9f2ac9d25d4e1f1a4472926b217a9a - () https://git.kernel.org/stable/c/948615429c9f2ac9d25d4e1f1a4472926b217a9a - Patch
References () https://git.kernel.org/stable/c/b1217e40705b2f6d311c197b12866752656217ff - () https://git.kernel.org/stable/c/b1217e40705b2f6d311c197b12866752656217ff - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: slimbus: core: soluciona fuga de referencia de dispositivo al informar presencia Los dispositivos Slimbus pueden asignarse dinámicamente tras la recepción de mensajes de informe de presencia. Asegúrese de liberar la referencia tomada al buscar dispositivos ya registrados. Tenga en cuenta que esto requiere tomar una referencia adicional en caso de que el dispositivo aún no haya sido registrado y deba asignarse.

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/02b78bbfbafe49832e508079148cb87cdfa55825 -
  • () https://git.kernel.org/stable/c/948615429c9f2ac9d25d4e1f1a4472926b217a9a -
  • () https://git.kernel.org/stable/c/b1217e40705b2f6d311c197b12866752656217ff -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-03-17 21:09


NVD link : CVE-2026-23090

Mitre link : CVE-2026-23090

CVE.ORG link : CVE-2026-23090


JSON object : View

Products Affected

linux

  • linux_kernel