CVE-2026-43007
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
01/05/2026
Last modified:
07/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
accel/qaic: Handle DBC deactivation if the owner went away<br />
<br />
When a DBC is released, the device sends a QAIC_TRANS_DEACTIVATE_FROM_DEV<br />
transaction to the host over the QAIC_CONTROL MHI channel. QAIC handles<br />
this by calling decode_deactivate() to release the resources allocated for<br />
that DBC. Since that handling is done in the qaic_manage_ioctl() context,<br />
if the user goes away before receiving and handling the deactivation, the<br />
host will be out-of-sync with the DBCs available for use, and the DBC<br />
resources will not be freed unless the device is removed. If another user<br />
loads and requests to activate a network, then the device assigns the same<br />
DBC to that network, QAIC will "indefinitely" wait for dbc->in_use = false,<br />
leading the user process to hang.<br />
<br />
As a solution to this, handle QAIC_TRANS_DEACTIVATE_FROM_DEV transactions<br />
that are received after the user has gone away.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/08021f2d4a557d6491e3bcc288e96425f50aa3cf
- https://git.kernel.org/stable/c/2dd67966f39a2abf8ccb4865031c722e40e01b7f
- https://git.kernel.org/stable/c/2feec5ae5df785658924ab6bd91280dc3926507c
- https://git.kernel.org/stable/c/ee0180e77e6c8482644569632065411de844c515
- https://git.kernel.org/stable/c/f403094d9075d7c565a3d81002b781c325cb3c07



