CVE-2026-43276
Awaiting Analysis Awaiting Analysis - Queue
Use-After-Free in Linux Kernel MANA Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix double destroy_workqueue on service rescan PCI path While testing corner cases in the driver, a use-after-free crash was found on the service rescan PCI path. When mana_serv_reset() calls mana_gd_suspend(), mana_gd_cleanup() destroys gc->service_wq. If the subsequent mana_gd_resume() fails with -ETIMEDOUT or -EPROTO, the code falls through to mana_serv_rescan() which triggers pci_stop_and_remove_bus_device(). This invokes the PCI .remove callback (mana_gd_remove), which calls mana_gd_cleanup() a second time, attempting to destroy the already- freed workqueue. Fix this by NULL-checking gc->service_wq in mana_gd_cleanup() and setting it to NULL after destruction. Call stack of issue for reference: [Sat Feb 21 18:53:48 2026] Call Trace: [Sat Feb 21 18:53:48 2026] <TASK> [Sat Feb 21 18:53:48 2026] mana_gd_cleanup+0x33/0x70 [mana] [Sat Feb 21 18:53:48 2026] mana_gd_remove+0x3a/0xc0 [mana] [Sat Feb 21 18:53:48 2026] pci_device_remove+0x41/0xb0 [Sat Feb 21 18:53:48 2026] device_remove+0x46/0x70 [Sat Feb 21 18:53:48 2026] device_release_driver_internal+0x1e3/0x250 [Sat Feb 21 18:53:48 2026] device_release_driver+0x12/0x20 [Sat Feb 21 18:53:48 2026] pci_stop_bus_device+0x6a/0x90 [Sat Feb 21 18:53:48 2026] pci_stop_and_remove_bus_device+0x13/0x30 [Sat Feb 21 18:53:48 2026] mana_do_service+0x180/0x290 [mana] [Sat Feb 21 18:53:48 2026] mana_serv_func+0x24/0x50 [mana] [Sat Feb 21 18:53:48 2026] process_one_work+0x190/0x3d0 [Sat Feb 21 18:53:48 2026] worker_thread+0x16e/0x2e0 [Sat Feb 21 18:53:48 2026] kthread+0xf7/0x130 [Sat Feb 21 18:53:48 2026] ? __pfx_worker_thread+0x10/0x10 [Sat Feb 21 18:53:48 2026] ? __pfx_kthread+0x10/0x10 [Sat Feb 21 18:53:48 2026] ret_from_fork+0x269/0x350 [Sat Feb 21 18:53:48 2026] ? __pfx_kthread+0x10/0x10 [Sat Feb 21 18:53:48 2026] ret_from_fork_asm+0x1a/0x30 [Sat Feb 21 18:53:48 2026] </TASK>
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

There is no information provided about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's mana driver and involves a double destruction of a workqueue during a service rescan of the PCI path.

Specifically, when the function mana_serv_reset() calls mana_gd_suspend(), the workqueue gc->service_wq is destroyed by mana_gd_cleanup(). If mana_gd_resume() then fails, the code proceeds to mana_serv_rescan(), which triggers pci_stop_and_remove_bus_device(). This calls the PCI remove callback mana_gd_remove, which again calls mana_gd_cleanup() and attempts to destroy the already freed workqueue, causing a use-after-free crash.

The fix involves adding a NULL check before destroying the workqueue and setting the pointer to NULL after destruction to prevent double free.


How can this vulnerability impact me? :

This vulnerability can cause a use-after-free crash in the Linux kernel, leading to system instability or a kernel panic.

Such crashes can result in denial of service conditions where the affected system or device becomes unresponsive or requires a reboot.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability manifests as a use-after-free crash related to the mana driver in the Linux kernel, specifically involving double destruction of a workqueue during PCI service rescan.

Detection can be performed by monitoring kernel logs for crash traces that match the call stack provided in the description, which includes functions such as mana_gd_cleanup, mana_gd_remove, pci_device_remove, and pci_stop_and_remove_bus_device.

  • Use the command: dmesg | grep -i mana to look for relevant error messages or call traces.
  • Check system logs (e.g., /var/log/kern.log or /var/log/messages) for similar stack traces involving mana_gd_cleanup or pci_stop_and_remove_bus_device.
  • Use journalctl -k | grep -i mana to filter kernel logs for related errors.

What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed by ensuring that the workqueue is only destroyed once by NULL-checking the workqueue pointer and setting it to NULL after destruction.

Immediate mitigation steps include:

  • Update the Linux kernel to a version that includes the fix for this vulnerability.
  • If updating is not immediately possible, avoid triggering the service rescan PCI path that leads to the double destroy scenario.
  • Monitor system stability and kernel logs for signs of the use-after-free crash and reboot if such crashes occur.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart