CVE-2026-23096

In the Linux kernel, the following vulnerability has been resolved: uacce: fix cdev handling in the cleanup path When cdev_device_add fails, it internally releases the cdev memory, and if cdev_device_del is then executed, it will cause a hang error. To fix it, we check the return value of cdev_device_add() and clear uacce->cdev to avoid calling cdev_device_del in the uacce_remove.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

18 Mar 2026, 13:29

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1bc3e51367c420e6db31f41efa874c7a8e12194a - () https://git.kernel.org/stable/c/1bc3e51367c420e6db31f41efa874c7a8e12194a - Patch
References () https://git.kernel.org/stable/c/819d647406200d0e83e56fd2df8f451b11290559 - () https://git.kernel.org/stable/c/819d647406200d0e83e56fd2df8f451b11290559 - Patch
References () https://git.kernel.org/stable/c/98d67a1bd6caddd0a8b8c82a0b925742cf500936 - () https://git.kernel.org/stable/c/98d67a1bd6caddd0a8b8c82a0b925742cf500936 - Patch
References () https://git.kernel.org/stable/c/a3bece3678f6c88db1f44c602b2a63e84b4040ac - () https://git.kernel.org/stable/c/a3bece3678f6c88db1f44c602b2a63e84b4040ac - Patch
References () https://git.kernel.org/stable/c/bd2393ed7712513e7e2dbcb6e21464a67ff9e702 - () https://git.kernel.org/stable/c/bd2393ed7712513e7e2dbcb6e21464a67ff9e702 - Patch
References () https://git.kernel.org/stable/c/c94c7188d325bc5137d447d67a2f18f7d4f2f4a3 - () https://git.kernel.org/stable/c/c94c7188d325bc5137d447d67a2f18f7d4f2f4a3 - Patch
References () https://git.kernel.org/stable/c/d9031575a2f8aabc53af3025dd79af313a2e046b - () https://git.kernel.org/stable/c/d9031575a2f8aabc53af3025dd79af313a2e046b - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: uacce: corrección del manejo de cdev en la ruta de limpieza Cuando cdev_device_add falla, libera internamente la memoria de cdev, y si cdev_device_del se ejecuta entonces, causará un error de bloqueo. Para solucionarlo, verificamos el valor de retorno de cdev_device_add() y borramos uacce->cdev para evitar llamar a cdev_device_del en uacce_remove.
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/1bc3e51367c420e6db31f41efa874c7a8e12194a -
  • () https://git.kernel.org/stable/c/819d647406200d0e83e56fd2df8f451b11290559 -
  • () https://git.kernel.org/stable/c/c94c7188d325bc5137d447d67a2f18f7d4f2f4a3 -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-03-18 13:29


NVD link : CVE-2026-23096

Mitre link : CVE-2026-23096

CVE.ORG link : CVE-2026-23096


JSON object : View

Products Affected

linux

  • linux_kernel