dpaa2-switch: add bounds check for if_id in IRQ handler
Summary
| CVE | CVE-2026-23180 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-02-14 17:15:55 UTC |
| Updated | 2026-04-03 14:16:25 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: add bounds check for if_id in IRQ handler The IRQ handler extracts if_id from the upper 16 bits of the hardware status register and uses it to index into ethsw->ports[] without validation. Since if_id can be any 16-bit value (0-65535) but the ports array is only allocated with sw_attr.num_ifs elements, this can lead to an out-of-bounds read potentially. Add a bounds check before accessing the array, consistent with the existing validation in dpaa2_switch_rx(). |
Risk And Classification
Primary CVSS: v3.1 7 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000180000 probability, percentile 0.046740000 (date 2026-04-04)
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 7 | HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 7 | HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
HighPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 24ab724f8a4661b2dc8e696b41df93bdc108f7a1 77611cab5bdfff7a070ae574bbfba20a1de99d1b git | Not specified |
| CNA | Linux | Linux | affected 24ab724f8a4661b2dc8e696b41df93bdc108f7a1 34b56c16efd61325d80bf1d780d0e176be662f59 git | Not specified |
| CNA | Linux | Linux | affected 24ab724f8a4661b2dc8e696b41df93bdc108f7a1 f89e33c9c37f0001b730e23b3b05ab7b1ecface2 git | Not specified |
| CNA | Linux | Linux | affected 24ab724f8a4661b2dc8e696b41df93bdc108f7a1 2447edc367800ba914acf7ddd5d250416b45fb31 git | Not specified |
| CNA | Linux | Linux | affected 24ab724f8a4661b2dc8e696b41df93bdc108f7a1 1b381a638e1851d8cfdfe08ed9cdbec5295b18c9 git | Not specified |
| CNA | Linux | Linux | affected 24ab724f8a4661b2dc8e696b41df93bdc108f7a1 31a7a0bbeb006bac2d9c81a2874825025214b6d8 git | Not specified |
| CNA | Linux | Linux | affected 5.15 | Not specified |
| CNA | Linux | Linux | unaffected 5.15 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.200 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.163 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.124 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.70 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.10 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/1b381a638e1851d8cfdfe08ed9cdbec5295b18c9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/31a7a0bbeb006bac2d9c81a2874825025214b6d8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/77611cab5bdfff7a070ae574bbfba20a1de99d1b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/2447edc367800ba914acf7ddd5d250416b45fb31 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/f89e33c9c37f0001b730e23b3b05ab7b1ecface2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/34b56c16efd61325d80bf1d780d0e176be662f59 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.