Linux Kernel UAF in fsl-mc driver_override_show
CVE-2026-23221 Published on February 18, 2026
bus: fsl-mc: fix use-after-free in driver_override_show()
In the Linux kernel, the following vulnerability has been resolved:
bus: fsl-mc: fix use-after-free in driver_override_show()
The driver_override_show() function reads the driver_override string
without holding the device_lock. However, driver_override_store() uses
driver_set_override(), which modifies and frees the string while holding
the device_lock.
This can result in a concurrent use-after-free if the string is freed
by the store function while being read by the show function.
Fix this by holding the device_lock around the read operation.
Products Associated with CVE-2026-23221
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-23221 are published in Linux Kernel:
Affected Versions
Linux:- Version 1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d and below c71dfb7833db7af652ee8f65011f14c97c47405d is affected.
- Version 1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d and below c424e72cfa67e7e1477035058a8a659f2c0ea637 is affected.
- Version 1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d and below b1983840287303e0dfb401b1b6cecc5ea7471e90 is affected.
- Version 1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d and below dd8ba8c0c3f3916d4ee1e3a09da9cd5caff5d227 is affected.
- Version 1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d and below 1d6bd6183e723a7b256ff34bbb5b498b5f4f2ec0 is affected.
- Version 1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d and below a2ae33e1c6361e960a4d00f7cf75d880b54f9528 is affected.
- Version 1f86a00c1159fd77e66b1bd6ff1a183f4d46f34d and below 148891e95014b5dc5878acefa57f1940c281c431 is affected.
- Version 5.10 is affected.
- Before 5.10 is unaffected.
- Version 5.15.201, <= 5.15.* is unaffected.
- Version 6.1.164, <= 6.1.* is unaffected.
- Version 6.6.127, <= 6.6.* is unaffected.
- Version 6.12.74, <= 6.12.* is unaffected.
- Version 6.18.11, <= 6.18.* is unaffected.
- Version 6.19.1, <= 6.19.* is unaffected.
- Version 7.0-rc1, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.