CVE-2026-23104
Unknown Unknown - Not Provided
Use-After-Free Vulnerability in Linux Kernel ice Driver hwmon Component

Publication date: 2026-02-04

Last updated on: 2026-03-25

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ice: fix devlink reload call trace Commit 4da71a77fc3b ("ice: read internal temperature sensor") introduced internal temperature sensor reading via HWMON. ice_hwmon_init() was added to ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a result if devlink reload is used to reinit the device and then the driver is removed, a call trace can occur. BUG: unable to handle page fault for address: ffffffffc0fd4b5d Call Trace: string+0x48/0xe0 vsnprintf+0x1f9/0x650 sprintf+0x62/0x80 name_show+0x1f/0x30 dev_attr_show+0x19/0x60 The call trace repeats approximately every 10 minutes when system monitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs attributes that reference freed module memory. The sequence is: 1. Driver load, ice_hwmon_init() gets called from ice_init_feature() 2. Devlink reload down, flow does not call ice_remove() 3. Devlink reload up, ice_hwmon_init() gets called from ice_init_feature() resulting in a second instance 4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the first hwmon instance orphaned with dangling pointer Fix this by moving ice_hwmon_exit() from ice_remove() to ice_deinit_features() to ensure proper cleanup symmetry with ice_hwmon_init().
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-04
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-02-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
linux linux_kernel 6.19
linux linux_kernel 6.19
linux linux_kernel 6.19
linux linux_kernel 6.19
linux linux_kernel 6.19
linux linux_kernel 6.19
linux linux_kernel From 6.8 (inc) to 6.18.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's ice driver related to the handling of the internal temperature sensor via HWMON. A recent change introduced the reading of this sensor and added initialization and cleanup functions for it. However, when the device is reinitialized using devlink reload and then the driver is removed, a call trace (error) occurs due to orphaned hardware monitoring sysfs attributes referencing freed module memory. This happens because the cleanup function was not called properly during devlink reload, leaving dangling pointers that cause repeated errors when system monitoring tools try to access them.


How can this vulnerability impact me? :

The vulnerability can cause repeated kernel call traces (errors) approximately every 10 minutes when system monitoring tools attempt to read hardware monitoring attributes that reference freed memory. This can lead to system instability or crashes due to page faults, potentially affecting system reliability and monitoring accuracy.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by observing repeated call traces approximately every 10 minutes in the system logs. These call traces occur when system monitoring tools attempt to read orphaned hwmon sysfs attributes referencing freed module memory.

Specifically, the call trace includes messages such as "BUG: unable to handle page fault for address" followed by a stack trace involving functions like vsnprintf, sprintf, name_show, and dev_attr_show.

To detect this on your system, you can monitor the kernel log for these call traces using commands like:

  • dmesg | grep -i 'BUG: unable to handle page fault'
  • journalctl -k | grep -i 'BUG: unable to handle page fault'
  • watch -n 600 'dmesg | tail -n 20'

Additionally, monitoring system tools like sadc that read hwmon sysfs attributes may trigger these call traces, so checking logs around their execution times can help identify the issue.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is caused by improper cleanup of hwmon instances during devlink reload and driver removal, leading to dangling pointers and call traces.

Immediate mitigation involves ensuring that the Linux kernel version in use includes the fix that moves ice_hwmon_exit() from ice_remove() to ice_deinit_features(), which properly cleans up the hwmon instances.

Therefore, the recommended immediate step is to update your Linux kernel to a version that contains this fix.

As a temporary workaround, avoid using devlink reload commands that reinitialize the device and then remove the driver until the fix is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart