CVE-2026-43056

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
01/05/2026
Last modified:
07/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: mana: fix use-after-free in add_adev() error path<br /> <br /> If auxiliary_device_add() fails, add_adev() jumps to add_fail and calls<br /> auxiliary_device_uninit(adev).<br /> <br /> The auxiliary device has its release callback set to adev_release(),<br /> which frees the containing struct mana_adev. Since adev is embedded in<br /> struct mana_adev, the subsequent fall-through to init_fail and access<br /> to adev-&gt;id may result in a use-after-free.<br /> <br /> Fix this by saving the allocated auxiliary device id in a local<br /> variable before calling auxiliary_device_add(), and use that saved id<br /> in the cleanup path after auxiliary_device_uninit().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.134 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.81 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.12 (excluding)
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*