Vulnerability Details CVE-2026-23422
In the Linux kernel, the following vulnerability has been resolved:
dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler
Commit 31a7a0bbeb00 ("dpaa2-switch: add bounds check for if_id in IRQ
handler") introduces a range check for if_id to avoid an out-of-bounds
access. If an out-of-bounds if_id is detected, the interrupt status is
not cleared. This may result in an interrupt storm.
Clear the interrupt status after detecting an out-of-bounds if_id to avoid
the problem.
Found by an experimental AI code review agent at Google.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 9.3%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2026-23422
-
cpe:2.3:o:linux:linux_kernel:5.15.200
-
cpe:2.3:o:linux:linux_kernel:5.15.201
-
cpe:2.3:o:linux:linux_kernel:6.1.163
-
cpe:2.3:o:linux:linux_kernel:6.1.164
-
cpe:2.3:o:linux:linux_kernel:6.1.165
-
cpe:2.3:o:linux:linux_kernel:6.12.70
-
cpe:2.3:o:linux:linux_kernel:6.12.72
-
cpe:2.3:o:linux:linux_kernel:6.12.74
-
cpe:2.3:o:linux:linux_kernel:6.12.75
-
cpe:2.3:o:linux:linux_kernel:6.18.10
-
cpe:2.3:o:linux:linux_kernel:6.18.11
-
cpe:2.3:o:linux:linux_kernel:6.18.13
-
cpe:2.3:o:linux:linux_kernel:6.18.14
-
cpe:2.3:o:linux:linux_kernel:6.19
-
cpe:2.3:o:linux:linux_kernel:6.19.1
-
cpe:2.3:o:linux:linux_kernel:6.19.3
-
cpe:2.3:o:linux:linux_kernel:6.19.4
-
cpe:2.3:o:linux:linux_kernel:6.6.124
-
cpe:2.3:o:linux:linux_kernel:6.6.125
-
cpe:2.3:o:linux:linux_kernel:6.6.127
-
cpe:2.3:o:linux:linux_kernel:6.6.128
-
cpe:2.3:o:linux:linux_kernel:7.0