CVE-2026-23454 PUBLISHED

net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown

Assigner: Linux
Reserved: 13.01.2026 Published: 03.04.2026 Updated: 03.04.2026

In the Linux kernel, the following vulnerability has been resolved:

net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown

A potential race condition exists in mana_hwc_destroy_channel() where hwc->caller_ctx is freed before the HWC's Completion Queue (CQ) and Event Queue (EQ) are destroyed. This allows an in-flight CQ interrupt handler to dereference freed memory, leading to a use-after-free or NULL pointer dereference in mana_hwc_handle_resp().

mana_smc_teardown_hwc() signals the hardware to stop but does not synchronize against IRQ handlers already executing on other CPUs. The IRQ synchronization only happens in mana_hwc_destroy_cq() via mana_gd_destroy_eq() -> mana_gd_deregister_irq(). Since this runs after kfree(hwc->caller_ctx), a concurrent mana_hwc_rx_event_handler() can dereference freed caller_ctx (and rxq->msg_buf) in mana_hwc_handle_resp().

Fix this by reordering teardown to reverse-of-creation order: destroy the TX/RX work queues and CQ/EQ before freeing hwc->caller_ctx. This ensures all in-flight interrupt handlers complete before the memory they access is freed.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f to e23bf444512cb85d76012080a76cd1f9e967448e (excl.)
  • affected from ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f to 249e905571583a434d4ea8d6f92ccc0eef337115 (excl.)
  • affected from ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f to 2b001901f689021acd7bf2dceed74a1bdcaaa1f9 (excl.)
  • affected from ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f to afdb1533eb9c05432aeb793a7280fa827c502f5c (excl.)
  • affected from ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f to 05d345719d85b927cba74afac4d5322de3aa4256 (excl.)
  • affected from ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f to fa103fc8f56954a60699a29215cb713448a39e87 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 5.13 is affected
  • unaffected from 0 to 5.13 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.78 to 6.12.* (incl.)
  • unaffected from 6.18.20 to 6.18.* (incl.)
  • unaffected from 6.19.10 to 6.19.* (incl.)
  • unaffected from 7.0-rc5 to * (incl.)

References