-

CVE-2026-23454

net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown

In the Linux kernel, the following vulnerability has been resolved:

net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown

A potential race condition exists in mana_hwc_destroy_channel() where
hwc->caller_ctx is freed before the HWC's Completion Queue (CQ) and
Event Queue (EQ) are destroyed. This allows an in-flight CQ interrupt
handler to dereference freed memory, leading to a use-after-free or
NULL pointer dereference in mana_hwc_handle_resp().

mana_smc_teardown_hwc() signals the hardware to stop but does not
synchronize against IRQ handlers already executing on other CPUs. The
IRQ synchronization only happens in mana_hwc_destroy_cq() via
mana_gd_destroy_eq() -> mana_gd_deregister_irq(). Since this runs
after kfree(hwc->caller_ctx), a concurrent mana_hwc_rx_event_handler()
can dereference freed caller_ctx (and rxq->msg_buf) in
mana_hwc_handle_resp().

Fix this by reordering teardown to reverse-of-creation order: destroy
the TX/RX work queues and CQ/EQ before freeing hwc->caller_ctx. This
ensures all in-flight interrupt handlers complete before the memory they
access is freed.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f
Version < b88edf12fc3779521ae5f6f1584153b15f7da6df
Status affected
Version ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f
Version < e23bf444512cb85d76012080a76cd1f9e967448e
Status affected
Version ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f
Version < 249e905571583a434d4ea8d6f92ccc0eef337115
Status affected
Version ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f
Version < 2b001901f689021acd7bf2dceed74a1bdcaaa1f9
Status affected
Version ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f
Version < afdb1533eb9c05432aeb793a7280fa827c502f5c
Status affected
Version ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f
Version < 05d345719d85b927cba74afac4d5322de3aa4256
Status affected
Version ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f
Version < fa103fc8f56954a60699a29215cb713448a39e87
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.13
Status affected
Version 0
Version < 5.13
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.20
Status unaffected
Version <= 6.19.*
Version 6.19.10
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.102
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.