CVE-2026-23422 PUBLISHED

dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler

Assigner: Linux
Reserved: 13.01.2026 Published: 03.04.2026 Updated: 03.04.2026

In the Linux kernel, the following vulnerability has been resolved:

dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler

Commit 31a7a0bbeb00 ("dpaa2-switch: add bounds check for if_id in IRQ handler") introduces a range check for if_id to avoid an out-of-bounds access. If an out-of-bounds if_id is detected, the interrupt status is not cleared. This may result in an interrupt storm.

Clear the interrupt status after detecting an out-of-bounds if_id to avoid the problem.

Found by an experimental AI code review agent at Google.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 34b56c16efd61325d80bf1d780d0e176be662f59 to b5bababe7703a7322bc59b803ab1587887a2a5e4 (excl.)
  • affected from f89e33c9c37f0001b730e23b3b05ab7b1ecface2 to c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e (excl.)
  • affected from 2447edc367800ba914acf7ddd5d250416b45fb31 to fa4412cdc5178a48799bafcb8af28fd2fbf3d703 (excl.)
  • affected from 1b381a638e1851d8cfdfe08ed9cdbec5295b18c9 to 00f42ace446f1e4bf84988f2281131f52cd32796 (excl.)
  • affected from 31a7a0bbeb006bac2d9c81a2874825025214b6d8 to 28fd8ac1d49389cb230d712116f54e27ebec11b8 (excl.)
  • affected from 31a7a0bbeb006bac2d9c81a2874825025214b6d8 to 74badb9c20b1a9c02a95c735c6d3cd6121679c93 (excl.)
  • Version 77611cab5bdfff7a070ae574bbfba20a1de99d1b is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.19 is affected
  • unaffected from 0 to 6.19 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.77 to 6.12.* (incl.)
  • unaffected from 6.18.17 to 6.18.* (incl.)
  • unaffected from 6.19.7 to 6.19.* (incl.)
  • unaffected from 7.0-rc3 to * (incl.)

References