VYPR
Unrated severityNVD Advisory· Published May 5, 2026· Updated May 6, 2026

CVE-2026-43064

CVE-2026-43064

Description

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix not releasing workqueue on .release()

The workqueue associated with an DSA/IAA device is not released when the object is freed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's idxd driver, a workqueue is not released when a DSA/IAA device object is freed, leading to resource leakage.

Vulnerability

Overview

CVE-2026-43064 is a resource leak vulnerability in the Linux kernel's dmaengine: idxd driver. The bug occurs when a workqueue associated with a DSA (Data Streaming Accelerator) or IAA (Integrity and Data Accelerator) device is not released when the device object is freed via the .release() method [1][2]. This omission causes the workqueue to persist after the device has been deallocated, wasting kernel memory and potentially preventing proper cleanup of related resources.

Exploitation

Context

The vulnerability is triggered during normal device removal or driver unload operations. No special authentication is required beyond the ability to trigger a device removal (e.g., unbinding the driver or physically removing a device). An attacker with local access and sufficient privileges to manage hardware devices could repeatedly create and destroy DSA/IAA devices to exhaust system memory. The attack surface is local, requiring access to the host system.

Impact

An attacker who exploits this bug can cause a denial of service (DoS) by exhausting kernel memory through accumulated unreleased workqueues. Each unreleased workqueue consumes memory and kernel object references, potentially leading to system stability may degrade until a reboot is required. The vulnerability does not directly allow privilege escalation or arbitrary code execution.

Mitigation

Patches for this issue have been committed to the Linux kernel stable tree [1][2][3][4]. Administrators should update to kernels containing these commits. No workaround is available for unpatched systems; removal of DSA/IAA devices should be avoided until the fix is applied.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.