Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-23013
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-25 Jan, 2026 | 14:36
Updated At-03 Apr, 2026 | 13:31
Rejected At-
▼CVE Numbering Authority (CNA)
net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback

In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request_irqs() requests MSI-X queue IRQs with dev_id set to ioq_vector. If request_irq() fails part-way, the rollback loop calls free_irq() with dev_id set to 'oct', which does not match the original dev_id and may leave the irqaction registered. This can keep IRQ handlers alive while ioq_vector is later freed during unwind/teardown, leading to a use-after-free or crash when an interrupt fires. Fix the error path to free IRQs with the same ioq_vector dev_id used during request_irq().

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/marvell/octeon_ep_vf/octep_vf_main.c
Default Status
unaffected
Versions
Affected
  • From 1cd3b407977c3ab1d2ddc26cb7113e7fb1509cd1 before aa05a8371ae4a452df623f7202c72409d3c50e40 (git)
  • From 1cd3b407977c3ab1d2ddc26cb7113e7fb1509cd1 before aa4c066229b05fc3d3c5f42693d25b1828533b6e (git)
  • From 1cd3b407977c3ab1d2ddc26cb7113e7fb1509cd1 before f93fc5d12d69012788f82151bee55fce937e1432 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/marvell/octeon_ep_vf/octep_vf_main.c
Default Status
affected
Versions
Affected
  • 6.9
Unaffected
  • From 0 before 6.9 (semver)
  • From 6.12.67 through 6.12.* (semver)
  • From 6.18.7 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/aa05a8371ae4a452df623f7202c72409d3c50e40
N/A
https://git.kernel.org/stable/c/aa4c066229b05fc3d3c5f42693d25b1828533b6e
N/A
https://git.kernel.org/stable/c/f93fc5d12d69012788f82151bee55fce937e1432
N/A
Hyperlink: https://git.kernel.org/stable/c/aa05a8371ae4a452df623f7202c72409d3c50e40
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/aa4c066229b05fc3d3c5f42693d25b1828533b6e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f93fc5d12d69012788f82151bee55fce937e1432
Resource: N/A
Details not found