CVE-2026-43064
Description
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Fix not releasing workqueue on .release()
The workqueue associated with an DSA/IAA device is not released when the object is freed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's idxd driver, a workqueue is not released when a DSA/IAA device object is freed, leading to resource leakage.
Vulnerability
Overview
CVE-2026-43064 is a resource leak vulnerability in the Linux kernel's dmaengine: idxd driver. The bug occurs when a workqueue associated with a DSA (Data Streaming Accelerator) or IAA (Integrity and Data Accelerator) device is not released when the device object is freed via the .release() method [1][2]. This omission causes the workqueue to persist after the device has been deallocated, wasting kernel memory and potentially preventing proper cleanup of related resources.
Exploitation
Context
The vulnerability is triggered during normal device removal or driver unload operations. No special authentication is required beyond the ability to trigger a device removal (e.g., unbinding the driver or physically removing a device). An attacker with local access and sufficient privileges to manage hardware devices could repeatedly create and destroy DSA/IAA devices to exhaust system memory. The attack surface is local, requiring access to the host system.
Impact
An attacker who exploits this bug can cause a denial of service (DoS) by exhausting kernel memory through accumulated unreleased workqueues. Each unreleased workqueue consumes memory and kernel object references, potentially leading to system stability may degrade until a reboot is required. The vulnerability does not directly allow privilege escalation or arbitrary code execution.
Mitigation
Patches for this issue have been committed to the Linux kernel stable tree [1][2][3][4]. Administrators should update to kernels containing these commits. No workaround is available for unpatched systems; removal of DSA/IAA devices should be avoided until the fix is applied.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- git.kernel.org/stable/c/2bb9e9e93adff9cc8a138ae9a3a8d59b3452272envd
- git.kernel.org/stable/c/3d33de353b1ff9023d5ec73b9becf80ea87af695nvd
- git.kernel.org/stable/c/958e96533ddbd1edd127feb7624a7eed0cc379dcnvd
- git.kernel.org/stable/c/d02c24af126dee45247dc7890409c86d1831859dnvd
- git.kernel.org/stable/c/fc34f199eb576b3a73089452fdf0056cc9a9301dnvd
- git.kernel.org/stable/c/fd4cb61bbd0fc3a749a8da6145cbb56d8f6dba35nvd
News mentions
0No linked articles in our index yet.