CVE-2026-43276
Use-After-Free in Linux Kernel MANA Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
There is no information provided about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's mana driver and involves a double destruction of a workqueue during a service rescan of the PCI path.
Specifically, when the function mana_serv_reset() calls mana_gd_suspend(), the workqueue gc->service_wq is destroyed by mana_gd_cleanup(). If mana_gd_resume() then fails, the code proceeds to mana_serv_rescan(), which triggers pci_stop_and_remove_bus_device(). This calls the PCI remove callback mana_gd_remove, which again calls mana_gd_cleanup() and attempts to destroy the already freed workqueue, causing a use-after-free crash.
The fix involves adding a NULL check before destroying the workqueue and setting the pointer to NULL after destruction to prevent double free.
How can this vulnerability impact me? :
This vulnerability can cause a use-after-free crash in the Linux kernel, leading to system instability or a kernel panic.
Such crashes can result in denial of service conditions where the affected system or device becomes unresponsive or requires a reboot.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a use-after-free crash related to the mana driver in the Linux kernel, specifically involving double destruction of a workqueue during PCI service rescan.
Detection can be performed by monitoring kernel logs for crash traces that match the call stack provided in the description, which includes functions such as mana_gd_cleanup, mana_gd_remove, pci_device_remove, and pci_stop_and_remove_bus_device.
- Use the command: dmesg | grep -i mana to look for relevant error messages or call traces.
- Check system logs (e.g., /var/log/kern.log or /var/log/messages) for similar stack traces involving mana_gd_cleanup or pci_stop_and_remove_bus_device.
- Use journalctl -k | grep -i mana to filter kernel logs for related errors.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by ensuring that the workqueue is only destroyed once by NULL-checking the workqueue pointer and setting it to NULL after destruction.
Immediate mitigation steps include:
- Update the Linux kernel to a version that includes the fix for this vulnerability.
- If updating is not immediately possible, avoid triggering the service rescan PCI path that leads to the double destroy scenario.
- Monitor system stability and kernel logs for signs of the use-after-free crash and reboot if such crashes occur.