Home

Description

In the Linux kernel, the following vulnerability has been resolved: net/mana: Null service_wq on setup error to prevent double destroy In mana_gd_setup() error path, set gc->service_wq to NULL after destroy_workqueue() to match the cleanup in mana_gd_cleanup(). This prevents a use-after-free if the workqueue pointer is checked after a failed setup.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-08 | Updated 2026-05-08 | Assigner Linux

Product status

Default status
unaffected

fa3c2f8d9152344a478abb847081c1b5f84a94f5 (git) before 59489ce60d7412ed82fb1d8002faa3102dcd4916
affected

a9a7c3203fdc4d4a8d8a7a3b1ed05d2bb4c6e77e (git) before 6c92392602b451e3869f15ab685f8f650e942b13
affected

f975a0955276579e2176a134366ed586071c7c6a (git) before 87c2302813abc55c46485711a678e3c312b00666
affected

Default status
unaffected

6.18.16 (semver) before 6.18.19
affected

6.19.6 (semver) before 6.19.9
affected

References

git.kernel.org/...c/59489ce60d7412ed82fb1d8002faa3102dcd4916

git.kernel.org/...c/6c92392602b451e3869f15ab685f8f650e942b13

git.kernel.org/...c/87c2302813abc55c46485711a678e3c312b00666

cve.org (CVE-2026-43440)

nvd.nist.gov (CVE-2026-43440)

Download JSON