CVE-2026-23063

Source
https://cve.org/CVERecord?id=CVE-2026-23063
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23063.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23063
Downstream
Related
Published
2026-02-04T16:07:45.426Z
Modified
2026-03-24T08:59:19.842358Z
Summary
uacce: ensure safe queue release with state management
Details

In the Linux kernel, the following vulnerability has been resolved:

uacce: ensure safe queue release with state management

Directly calling put_queue carries risks since it cannot guarantee that resources of uacce_queue have been fully released beforehand. So adding a stop_queue operation for the UACCECMDPUT_Q command and leaving the put_queue operation to the final resource release ensures safety.

Queue states are defined as follows: - UACCEQZOMBIE: Initial state - UACCEQINIT: After opening uacce - UACCEQSTARTED: After start is issued via ioctl

When executing poweroff -f in virt while accelerator are still working, uacce_fops_release and uacce_remove may execute concurrently. This can cause uacce_put_queue within uacce_fops_release to access a NULL ops pointer. Therefore, add state checks to prevent accessing freed pointers.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23063.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
015d239ac0142ad0e26567fd890ef8d171f13709
Fixed
b457abeb5d962db88aaf60e249402fd3073dbfab
Fixed
8b57bf1d3b1db692f34bce694a03e41be79f6016
Fixed
336fb41a186e7c0415ae94fec9e23d1f04b87483
Fixed
43f233eb6e7b9d88536881a9bc43726d0e34800d
Fixed
47634d70073890c9c37e39ab4ff93d4b585b028a
Fixed
92e4f11e29b98ef424ff72d6371acac03e5d973c
Fixed
26c08dabe5475d99a13f353d8dd70e518de45663

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23063.json"