๐Ÿ” CVE Alert

CVE-2026-23063

UNKNOWN 0.0

uacce: ensure safe queue release with state management

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: uacce: ensure safe queue release with state management Directly calling `put_queue` carries risks since it cannot guarantee that resources of `uacce_queue` have been fully released beforehand. So adding a `stop_queue` operation for the UACCE_CMD_PUT_Q command and leaving the `put_queue` operation to the final resource release ensures safety. Queue states are defined as follows: - UACCE_Q_ZOMBIE: Initial state - UACCE_Q_INIT: After opening `uacce` - UACCE_Q_STARTED: After `start` is issued via `ioctl` When executing `poweroff -f` in virt while accelerator are still working, `uacce_fops_release` and `uacce_remove` may execute concurrently. This can cause `uacce_put_queue` within `uacce_fops_release` to access a NULL `ops` pointer. Therefore, add state checks to prevent accessing freed pointers.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 4, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
015d239ac0142ad0e26567fd890ef8d171f13709 < b457abeb5d962db88aaf60e249402fd3073dbfab 015d239ac0142ad0e26567fd890ef8d171f13709 < 8b57bf1d3b1db692f34bce694a03e41be79f6016 015d239ac0142ad0e26567fd890ef8d171f13709 < 336fb41a186e7c0415ae94fec9e23d1f04b87483 015d239ac0142ad0e26567fd890ef8d171f13709 < 43f233eb6e7b9d88536881a9bc43726d0e34800d 015d239ac0142ad0e26567fd890ef8d171f13709 < 47634d70073890c9c37e39ab4ff93d4b585b028a 015d239ac0142ad0e26567fd890ef8d171f13709 < 92e4f11e29b98ef424ff72d6371acac03e5d973c 015d239ac0142ad0e26567fd890ef8d171f13709 < 26c08dabe5475d99a13f353d8dd70e518de45663
Linux / Linux
5.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b457abeb5d962db88aaf60e249402fd3073dbfab git.kernel.org: https://git.kernel.org/stable/c/8b57bf1d3b1db692f34bce694a03e41be79f6016 git.kernel.org: https://git.kernel.org/stable/c/336fb41a186e7c0415ae94fec9e23d1f04b87483 git.kernel.org: https://git.kernel.org/stable/c/43f233eb6e7b9d88536881a9bc43726d0e34800d git.kernel.org: https://git.kernel.org/stable/c/47634d70073890c9c37e39ab4ff93d4b585b028a git.kernel.org: https://git.kernel.org/stable/c/92e4f11e29b98ef424ff72d6371acac03e5d973c git.kernel.org: https://git.kernel.org/stable/c/26c08dabe5475d99a13f353d8dd70e518de45663