Use-after-free in Linux kernel - CVE-2026-43015
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to a use-after-free in the macb PCI glue driver clock handling during device removal when unregistering the driver and triggering a runtime resume callback. A local user can unload the affected module to trigger a use-after-free and cause a denial of service.
The issue is triggered during driver removal because a runtime resume callback may still access registered clock objects after the platform device has been unregistered.
How to mitigate CVE-2026-43015
Sources
- https://git.kernel.org/stable/c/16ab4c0e2b15df5d33bfcb9ea8e4441b85dd4a57
- https://git.kernel.org/stable/c/2d96204e4184d6f7dd2f93c6f218fd0c1f55e9ae
- https://git.kernel.org/stable/c/3496fb9e66f79d4def3bb7ec7563e3eaa33a688f
- https://git.kernel.org/stable/c/67f70841a175fa3469119f52d77a3662c07507a2
- https://git.kernel.org/stable/c/b3f799cdf830df1782ae463cf15ace35015be99e
- https://git.kernel.org/stable/c/bf64cae913cdd4821f13d5d1d68900c0891bef69
- https://git.kernel.org/stable/c/ce8fe5287b87e24e225c342f3b0ec04f0b3680fe
- https://git.kernel.org/stable/c/f310a836da90d0f0321b14d446c071af63f9ee4c