CVE-2026-23013Use After Free in Linux

CWE-416Use After Free7 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 25

Description

In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request_irqs() requests MSI-X queue IRQs with dev_id set to ioq_vector. If request_irq() fails part-way, the rollback loop calls free_irq() with dev_id set to 'oct', which does not match the original dev_id and may leave the irqaction registered. This can keep IRQ handlers alive while ioq_vector is later freed during unwind/teardown, leading to a use-aft

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel6.9.06.12.67+1
NVDlinux/linux_kernel6.9.16.12.67+3
Debianlinux/linux_kernel< 6.12.69-1+1
CVEListV5linux/linux1cd3b407977c3ab1d2ddc26cb7113e7fb1509cd1aa05a8371ae4a452df623f7202c72409d3c50e40+3
debiandebian/linux< linux 6.18.8-1 (forky)

Patches

🔴Vulnerability Details

3
GHSA
GHSA-r5qx-544g-4q99: In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request2026-01-25
OSV
net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback2026-01-25
OSV
CVE-2026-23013: In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request_i2026-01-25

📋Vendor Advisories

2
Red Hat
kernel: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback2026-01-25
Debian
CVE-2026-23013: linux - In the Linux kernel, the following vulnerability has been resolved: net: octeon...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23013 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23013 — Use After Free in Linux | cvebase