-

CVE-2026-23463

soc: fsl: qbman: fix race condition in qman_destroy_fq

In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: fix race condition in qman_destroy_fq

When QMAN_FQ_FLAG_DYNAMIC_FQID is set, there's a race condition between
fq_table[fq->idx] state and freeing/allocating from the pool and
WARN_ON(fq_table[fq->idx]) in qman_create_fq() gets triggered.

Indeed, we can have:
         Thread A                             Thread B
    qman_destroy_fq()                    qman_create_fq()
      qman_release_fqid()
        qman_shutdown_fq()
        gen_pool_free()
           -- At this point, the fqid is available again --
                                           qman_alloc_fqid()
           -- so, we can get the just-freed fqid in thread B --
                                           fq->fqid = fqid;
                                           fq->idx = fqid * 2;
                                           WARN_ON(fq_table[fq->idx]);
                                           fq_table[fq->idx] = fq;
     fq_table[fq->idx] = NULL;

And adding some logs between qman_release_fqid() and
fq_table[fq->idx] = NULL makes the WARN_ON() trigger a lot more.

To prevent that, ensure that fq_table[fq->idx] is set to NULL before
gen_pool_free() is called by using smp_wmb().
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < 66442cf9989bd4489fa80d9f37637d58ab016835
Status affected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < d288fbe652ef43b7128e4bc0c0c2ef6bd03a2210
Status affected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < 9e3d47904b8153c8c3ad2f9b66d5008aad677aa8
Status affected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < d21923a8059fa896bfef016f55dd769299335cb4
Status affected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < 751f60bd48edaf03f9d84ab09e5ce6705757d50f
Status affected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < 85dbbf7dc88b0a54f2e334daedf6f3f31fd004fa
Status affected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < 265e56714635c5dd1e5964bfd97fa6e73f62cde5
Status affected
Version c535e923bb97a4b361e89a6383693482057f8b0c
Version < 014077044e874e270ec480515edbc1cadb976cf2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.9
Status affected
Version 0
Version < 4.9
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.20
Status unaffected
Version <= 6.19.*
Version 6.19.10
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.102
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.