CVE-2026-23090 (GCVE-0-2026-23090)
Vulnerability from cvelistv5
Published
2026-02-04 16:08
Modified
2026-02-09 08:38
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: slimbus: core: fix device reference leak on report present Slimbus devices can be allocated dynamically upon reception of report-present messages. Make sure to drop the reference taken when looking up already registered devices. Note that this requires taking an extra reference in case the device has not yet been registered and has to be allocated.
Impacted products
Vendor Product Version
Linux Linux Version: 46a2bb5a7f7ea2728be50f8f5b29a20267f700fe
Version: 46a2bb5a7f7ea2728be50f8f5b29a20267f700fe
Version: 46a2bb5a7f7ea2728be50f8f5b29a20267f700fe
Version: 46a2bb5a7f7ea2728be50f8f5b29a20267f700fe
Version: 46a2bb5a7f7ea2728be50f8f5b29a20267f700fe
Version: 46a2bb5a7f7ea2728be50f8f5b29a20267f700fe
Version: 46a2bb5a7f7ea2728be50f8f5b29a20267f700fe
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/slimbus/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b1217e40705b2f6d311c197b12866752656217ff",
              "status": "affected",
              "version": "46a2bb5a7f7ea2728be50f8f5b29a20267f700fe",
              "versionType": "git"
            },
            {
              "lessThan": "948615429c9f2ac9d25d4e1f1a4472926b217a9a",
              "status": "affected",
              "version": "46a2bb5a7f7ea2728be50f8f5b29a20267f700fe",
              "versionType": "git"
            },
            {
              "lessThan": "02b78bbfbafe49832e508079148cb87cdfa55825",
              "status": "affected",
              "version": "46a2bb5a7f7ea2728be50f8f5b29a20267f700fe",
              "versionType": "git"
            },
            {
              "lessThan": "2ddc09f6a0a221b1d91a7cbc8cc2cefdbd334fe6",
              "status": "affected",
              "version": "46a2bb5a7f7ea2728be50f8f5b29a20267f700fe",
              "versionType": "git"
            },
            {
              "lessThan": "54de72a7aabc0749938d7a2833a0c1a5d3ed7ac9",
              "status": "affected",
              "version": "46a2bb5a7f7ea2728be50f8f5b29a20267f700fe",
              "versionType": "git"
            },
            {
              "lessThan": "6602bb4d1338e92b5838e50322b87697bdbd2ee0",
              "status": "affected",
              "version": "46a2bb5a7f7ea2728be50f8f5b29a20267f700fe",
              "versionType": "git"
            },
            {
              "lessThan": "9391380eb91ea5ac792aae9273535c8da5b9aa01",
              "status": "affected",
              "version": "46a2bb5a7f7ea2728be50f8f5b29a20267f700fe",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/slimbus/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.16"
            },
            {
              "lessThan": "4.16",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.249",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.199",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.162",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.122",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.68",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.19",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.249",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.199",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.162",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.122",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.68",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.8",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: core: fix device reference leak on report present\n\nSlimbus devices can be allocated dynamically upon reception of\nreport-present messages.\n\nMake sure to drop the reference taken when looking up already registered\ndevices.\n\nNote that this requires taking an extra reference in case the device has\nnot yet been registered and has to be allocated."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T08:38:30.400Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b1217e40705b2f6d311c197b12866752656217ff"
        },
        {
          "url": "https://git.kernel.org/stable/c/948615429c9f2ac9d25d4e1f1a4472926b217a9a"
        },
        {
          "url": "https://git.kernel.org/stable/c/02b78bbfbafe49832e508079148cb87cdfa55825"
        },
        {
          "url": "https://git.kernel.org/stable/c/2ddc09f6a0a221b1d91a7cbc8cc2cefdbd334fe6"
        },
        {
          "url": "https://git.kernel.org/stable/c/54de72a7aabc0749938d7a2833a0c1a5d3ed7ac9"
        },
        {
          "url": "https://git.kernel.org/stable/c/6602bb4d1338e92b5838e50322b87697bdbd2ee0"
        },
        {
          "url": "https://git.kernel.org/stable/c/9391380eb91ea5ac792aae9273535c8da5b9aa01"
        }
      ],
      "title": "slimbus: core: fix device reference leak on report present",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-23090",
    "datePublished": "2026-02-04T16:08:13.438Z",
    "dateReserved": "2026-01-13T15:37:45.962Z",
    "dateUpdated": "2026-02-09T08:38:30.400Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…