CVE-2026-23063
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
04/02/2026
Last modified:
13/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
uacce: ensure safe queue release with state management<br />
<br />
Directly calling `put_queue` carries risks since it cannot<br />
guarantee that resources of `uacce_queue` have been fully released<br />
beforehand. So adding a `stop_queue` operation for the<br />
UACCE_CMD_PUT_Q command and leaving the `put_queue` operation to<br />
the final resource release ensures safety.<br />
<br />
Queue states are defined as follows:<br />
- UACCE_Q_ZOMBIE: Initial state<br />
- UACCE_Q_INIT: After opening `uacce`<br />
- UACCE_Q_STARTED: After `start` is issued via `ioctl`<br />
<br />
When executing `poweroff -f` in virt while accelerator are still<br />
working, `uacce_fops_release` and `uacce_remove` may execute<br />
concurrently. This can cause `uacce_put_queue` within<br />
`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add<br />
state checks to prevent accessing freed pointers.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.249 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.199 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.122 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.68 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/26c08dabe5475d99a13f353d8dd70e518de45663
- https://git.kernel.org/stable/c/336fb41a186e7c0415ae94fec9e23d1f04b87483
- https://git.kernel.org/stable/c/43f233eb6e7b9d88536881a9bc43726d0e34800d
- https://git.kernel.org/stable/c/47634d70073890c9c37e39ab4ff93d4b585b028a
- https://git.kernel.org/stable/c/8b57bf1d3b1db692f34bce694a03e41be79f6016
- https://git.kernel.org/stable/c/92e4f11e29b98ef424ff72d6371acac03e5d973c
- https://git.kernel.org/stable/c/b457abeb5d962db88aaf60e249402fd3073dbfab



