CVE-2026-23221

Source
https://cve.org/CVERecord?id=CVE-2026-23221
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23221.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23221
Downstream
Related
Published
2026-02-18T14:53:24.391Z
Modified
2026-03-28T17:44:21.188106063Z
Summary
bus: fsl-mc: fix use-after-free in driver_override_show()
Details

In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: fix use-after-free in driveroverrideshow()

The driveroverrideshow() function reads the driveroverride string without holding the devicelock. However, driveroverridestore() uses driversetoverride(), which modifies and frees the string while holding the device_lock.

This can result in a concurrent use-after-free if the string is freed by the store function while being read by the show function.

Fix this by holding the device_lock around the read operation.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23221.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d
Fixed
c71dfb7833db7af652ee8f65011f14c97c47405d
Fixed
c424e72cfa67e7e1477035058a8a659f2c0ea637
Fixed
b1983840287303e0dfb401b1b6cecc5ea7471e90
Fixed
dd8ba8c0c3f3916d4ee1e3a09da9cd5caff5d227
Fixed
1d6bd6183e723a7b256ff34bbb5b498b5f4f2ec0
Fixed
a2ae33e1c6361e960a4d00f7cf75d880b54f9528
Fixed
148891e95014b5dc5878acefa57f1940c281c431

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23221.json"