In the Linux kernel, the following vulnerability has been resolved:
net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback
octep_vf_request_irqs() requests MSI-X queue IRQs with dev_id set to
ioq_vector. If request_irq() fails part-way, the rollback loop calls
free_irq() with dev_id set to 'oct', which does not match the original
dev_id and may leave the irqaction registered.
This can keep IRQ handlers alive while ioq_vector is later freed during
unwind/teardown, leading to a use-after-free or crash when an interrupt
fires.
Fix the error path to free IRQs with the same ioq_vector dev_id used
during request_irq().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-01-25 15:15
Updated : 2026-03-25 19:48
NVD link : CVE-2026-23013
Mitre link : CVE-2026-23013
CVE.ORG link : CVE-2026-23013
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
