Description
In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Fix thermal zone device registration error path

If thermal_zone_device_register_with_trips() fails after registering
a thermal zone device, it needs to wait for the tz->removal completion
like thermal_zone_device_unregister(), in case user space has managed
to take a reference to the thermal zone device's kobject, in which case
thermal_release() may not be called by the error path itself and tz may
be freed prematurely.

Add the missing wait_for_completion() call to the thermal zone device
registration error path.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s thermal core failed to wait for the completion of a thermal zone device’s removal after a registration failure. As a result, if a thread still holds a reference to the device’s kobject, it may be freed prematurely by another part of the kernel, causing a use‑after‑free. This kernel fault can lead to a crash and bring the system down. Based on the description, it is inferred that the flaw can be triggered by code that forces a thermal zone registration to fail, which typically requires a privileged or local attacker capable of executing kernel‑level code.

Affected Systems

All releases of the Linux kernel built before the applied fix are affected. The vulnerability applies to the entire Linux:Linux product family, and any vendor that ships an unpatched kernel image will be vulnerable. Because the specific version range is not enumerated, any kernel that does not contain the referenced commit is at risk. System administrators should verify that the running kernel contains the fix or upgrade to a newer release that incorporates it.

Risk and Exploitability

The EPSS score is not available and the fault is not listed in the CISA KEV catalog, suggesting that exploitation has not yet been observed in the wild. However, the use‑after‑free is a high‑severity kernel bug, and a local attacker could exploit it to crash the system. The likelihood of exploitation is therefore considered moderate until an exploit is documented, but the potential impact remains high.

Generated by OpenCVE AI on May 8, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the fix for thermal zone registration error handling
  • Restart the system to ensure the updated kernel is running
  • Monitor system logs (e.g., dmesg) for thermal driver errors and verify that no use‑after‑free faults occur

Generated by OpenCVE AI on May 8, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: thermal: core: Fix thermal zone device registration error path If thermal_zone_device_register_with_trips() fails after registering a thermal zone device, it needs to wait for the tz->removal completion like thermal_zone_device_unregister(), in case user space has managed to take a reference to the thermal zone device's kobject, in which case thermal_release() may not be called by the error path itself and tz may be freed prematurely. Add the missing wait_for_completion() call to the thermal zone device registration error path.
Title thermal: core: Fix thermal zone device registration error path
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:31:19.460Z

Reserved: 2026-05-01T14:12:56.002Z

Link: CVE-2026-43332

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:42.880

Modified: 2026-05-08T14:16:42.880

Link: CVE-2026-43332

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T23:15:20Z

Weaknesses