๐Ÿ” CVE Alert

CVE-2026-23454

UNKNOWN 0.0

net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
9th

In the Linux kernel, the following vulnerability has been resolved: net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown A potential race condition exists in mana_hwc_destroy_channel() where hwc->caller_ctx is freed before the HWC's Completion Queue (CQ) and Event Queue (EQ) are destroyed. This allows an in-flight CQ interrupt handler to dereference freed memory, leading to a use-after-free or NULL pointer dereference in mana_hwc_handle_resp(). mana_smc_teardown_hwc() signals the hardware to stop but does not synchronize against IRQ handlers already executing on other CPUs. The IRQ synchronization only happens in mana_hwc_destroy_cq() via mana_gd_destroy_eq() -> mana_gd_deregister_irq(). Since this runs after kfree(hwc->caller_ctx), a concurrent mana_hwc_rx_event_handler() can dereference freed caller_ctx (and rxq->msg_buf) in mana_hwc_handle_resp(). Fix this by reordering teardown to reverse-of-creation order: destroy the TX/RX work queues and CQ/EQ before freeing hwc->caller_ctx. This ensures all in-flight interrupt handlers complete before the memory they access is freed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 3, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f < e23bf444512cb85d76012080a76cd1f9e967448e ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f < 249e905571583a434d4ea8d6f92ccc0eef337115 ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f < 2b001901f689021acd7bf2dceed74a1bdcaaa1f9 ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f < afdb1533eb9c05432aeb793a7280fa827c502f5c ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f < 05d345719d85b927cba74afac4d5322de3aa4256 ca9c54d2d6a5ab2430c4eda364c77125d62e5e0f < fa103fc8f56954a60699a29215cb713448a39e87
Linux / Linux
5.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e23bf444512cb85d76012080a76cd1f9e967448e git.kernel.org: https://git.kernel.org/stable/c/249e905571583a434d4ea8d6f92ccc0eef337115 git.kernel.org: https://git.kernel.org/stable/c/2b001901f689021acd7bf2dceed74a1bdcaaa1f9 git.kernel.org: https://git.kernel.org/stable/c/afdb1533eb9c05432aeb793a7280fa827c502f5c git.kernel.org: https://git.kernel.org/stable/c/05d345719d85b927cba74afac4d5322de3aa4256 git.kernel.org: https://git.kernel.org/stable/c/fa103fc8f56954a60699a29215cb713448a39e87