๐Ÿ” CVE Alert

CVE-2026-23287

UNKNOWN 0.0

irqchip/sifive-plic: Fix frozen interrupt due to affinity setting

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: irqchip/sifive-plic: Fix frozen interrupt due to affinity setting PLIC ignores interrupt completion message for disabled interrupt, explained by the specification: The PLIC signals it has completed executing an interrupt handler by writing the interrupt ID it received from the claim to the claim/complete register. The PLIC does not check whether the completion ID is the same as the last claim ID for that target. If the completion ID does not match an interrupt source that is currently enabled for the target, the completion is silently ignored. This caused problems in the past, because an interrupt can be disabled while still being handled and plic_irq_eoi() had no effect. That was fixed by checking if the interrupt is disabled, and if so enable it, before sending the completion message. That check is done with irqd_irq_disabled(). However, that is not sufficient because the enable bit for the handling hart can be zero despite irqd_irq_disabled(d) being false. This can happen when affinity setting is changed while a hart is still handling the interrupt. This problem is easily reproducible by dumping a large file to uart (which generates lots of interrupts) and at the same time keep changing the uart interrupt's affinity setting. The uart port becomes frozen almost instantaneously. Fix this by checking PLIC's enable bit instead of irqd_irq_disabled().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 25, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
cc9f04f9a84f745949e325661550ed14bd0ff322 < 8942fb1a5bc2dcbd88f7e656d109d42f778f298f cc9f04f9a84f745949e325661550ed14bd0ff322 < 2edbd173309165d103be6c73bd83e459dc45ae7b cc9f04f9a84f745949e325661550ed14bd0ff322 < 686eb378a4a51aa967e08337dd59daade16aec0f cc9f04f9a84f745949e325661550ed14bd0ff322 < 1883332bf21feb8871af09daf604fc4836a76925 cc9f04f9a84f745949e325661550ed14bd0ff322 < f611791a927141d05d7030607dea6372311c1413 cc9f04f9a84f745949e325661550ed14bd0ff322 < 1072020685f4b81f6efad3b412cdae0bd62bb043
Linux / Linux
5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8942fb1a5bc2dcbd88f7e656d109d42f778f298f git.kernel.org: https://git.kernel.org/stable/c/2edbd173309165d103be6c73bd83e459dc45ae7b git.kernel.org: https://git.kernel.org/stable/c/686eb378a4a51aa967e08337dd59daade16aec0f git.kernel.org: https://git.kernel.org/stable/c/1883332bf21feb8871af09daf604fc4836a76925 git.kernel.org: https://git.kernel.org/stable/c/f611791a927141d05d7030607dea6372311c1413 git.kernel.org: https://git.kernel.org/stable/c/1072020685f4b81f6efad3b412cdae0bd62bb043