VYPR
Unrated severityNVD Advisory· Published Feb 4, 2026· Updated Apr 15, 2026

CVE-2026-23056

CVE-2026-23056

Description

In the Linux kernel, the following vulnerability has been resolved:

uacce: implement mremap in uacce_vm_ops to return -EPERM

The current uacce_vm_ops does not support the mremap operation of vm_operations_struct. Implement .mremap to return -EPERM to remind users.

The reason we need to explicitly disable mremap is that when the driver does not implement .mremap, it uses the default mremap method. This could lead to a risk scenario:

An application might first mmap address p1, then mremap to p2, followed by munmap(p1), and finally munmap(p2). Since the default mremap copies the original vma's vm_private_data (i.e., q) to the new vma, both munmap operations would trigger vma_close, causing q->qfr to be freed twice(qfr will be set to null here, so repeated release is ok).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's uacce driver, missing mremap implementation could lead to double free; patch disables mremap by returning -EPERM.

Root

Cause The uacce driver's vm_operations_struct did not implement the .mremap operation, causing the default mremap behavior to be used. The default mremap copies the original VMA's vm_private_data (which points to the queue structure q) to the new VMA. If an application performs mmap, mremap, munmap on the original address, and then munmap on the new address, both munmap calls trigger vma_close, leading to a double free of q->qfr (though qfr is set to NULL after the first free, the double free is still a bug) [1][2][3].

Exploitation

An attacker with local access and the ability to mmap and mremap a uacce device can trigger this double-free condition. No special privileges beyond access to the uacce device are required. The attack involves a specific sequence of memory operations that exploit the missing mremap restriction [1].

Impact

A double free can lead to memory corruption, potentially allowing an attacker to achieve privilege escalation or cause a denial of service (system crash). The severity is considered moderate as it requires local access and specific conditions [1][2][3].

Mitigation

The fix implements the .mremap callback in uacce_vm_ops to return -EPERM, explicitly disabling mremap on uacce mappings. This prevents the risky memory operations. Users should apply the corresponding stable kernel patches to address CVE-2026-23056 [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.