CVE-2026-23063
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/02/2026
Última modificación:
04/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
uacce: ensure safe queue release with state management<br />
<br />
Directly calling `put_queue` carries risks since it cannot<br />
guarantee that resources of `uacce_queue` have been fully released<br />
beforehand. So adding a `stop_queue` operation for the<br />
UACCE_CMD_PUT_Q command and leaving the `put_queue` operation to<br />
the final resource release ensures safety.<br />
<br />
Queue states are defined as follows:<br />
- UACCE_Q_ZOMBIE: Initial state<br />
- UACCE_Q_INIT: After opening `uacce`<br />
- UACCE_Q_STARTED: After `start` is issued via `ioctl`<br />
<br />
When executing `poweroff -f` in virt while accelerator are still<br />
working, `uacce_fops_release` and `uacce_remove` may execute<br />
concurrently. This can cause `uacce_put_queue` within<br />
`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add<br />
state checks to prevent accessing freed pointers.



