{"api_version":"1","generated_at":"2026-04-19T01:15:03+00:00","cve":"CVE-2026-23422","urls":{"html":"https://cve.report/CVE-2026-23422","api":"https://cve.report/api/cve/CVE-2026-23422.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-23422","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-23422"},"summary":{"title":"dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ndpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler\n\nCommit 31a7a0bbeb00 (\"dpaa2-switch: add bounds check for if_id in IRQ\nhandler\") introduces a range check for if_id to avoid an out-of-bounds\naccess. If an out-of-bounds if_id is detected, the interrupt status is\nnot cleared. This may result in an interrupt storm.\n\nClear the interrupt status after detecting an out-of-bounds if_id to avoid\nthe problem.\n\nFound by an experimental AI code review agent at Google.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-04-03 14:16:28","updated_at":"2026-04-18 09:16:26"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/28fd8ac1d49389cb230d712116f54e27ebec11b8","name":"https://git.kernel.org/stable/c/28fd8ac1d49389cb230d712116f54e27ebec11b8","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/00f42ace446f1e4bf84988f2281131f52cd32796","name":"https://git.kernel.org/stable/c/00f42ace446f1e4bf84988f2281131f52cd32796","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/74badb9c20b1a9c02a95c735c6d3cd6121679c93","name":"https://git.kernel.org/stable/c/74badb9c20b1a9c02a95c735c6d3cd6121679c93","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e","name":"https://git.kernel.org/stable/c/c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/7def51cb9fb8b8d5342443372b8cf28d8fbd7f3d","name":"https://git.kernel.org/stable/c/7def51cb9fb8b8d5342443372b8cf28d8fbd7f3d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/fa4412cdc5178a48799bafcb8af28fd2fbf3d703","name":"https://git.kernel.org/stable/c/fa4412cdc5178a48799bafcb8af28fd2fbf3d703","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/b5bababe7703a7322bc59b803ab1587887a2a5e4","name":"https://git.kernel.org/stable/c/b5bababe7703a7322bc59b803ab1587887a2a5e4","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23422","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23422","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 77611cab5bdfff7a070ae574bbfba20a1de99d1b 7def51cb9fb8b8d5342443372b8cf28d8fbd7f3d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 34b56c16efd61325d80bf1d780d0e176be662f59 b5bababe7703a7322bc59b803ab1587887a2a5e4 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f89e33c9c37f0001b730e23b3b05ab7b1ecface2 c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 2447edc367800ba914acf7ddd5d250416b45fb31 fa4412cdc5178a48799bafcb8af28fd2fbf3d703 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 1b381a638e1851d8cfdfe08ed9cdbec5295b18c9 00f42ace446f1e4bf84988f2281131f52cd32796 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 31a7a0bbeb006bac2d9c81a2874825025214b6d8 28fd8ac1d49389cb230d712116f54e27ebec11b8 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 31a7a0bbeb006bac2d9c81a2874825025214b6d8 74badb9c20b1a9c02a95c735c6d3cd6121679c93 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.19","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.203 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.167 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.130 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.77 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.17 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.7 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"23422","cve":"CVE-2026-23422","epss":"0.000320000","percentile":"0.090980000","score_date":"2026-04-18","updated_at":"2026-04-19 00:10:43"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/net/ethernet/freescale/dpaa2/dpaa2-switch.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"7def51cb9fb8b8d5342443372b8cf28d8fbd7f3d","status":"affected","version":"77611cab5bdfff7a070ae574bbfba20a1de99d1b","versionType":"git"},{"lessThan":"b5bababe7703a7322bc59b803ab1587887a2a5e4","status":"affected","version":"34b56c16efd61325d80bf1d780d0e176be662f59","versionType":"git"},{"lessThan":"c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e","status":"affected","version":"f89e33c9c37f0001b730e23b3b05ab7b1ecface2","versionType":"git"},{"lessThan":"fa4412cdc5178a48799bafcb8af28fd2fbf3d703","status":"affected","version":"2447edc367800ba914acf7ddd5d250416b45fb31","versionType":"git"},{"lessThan":"00f42ace446f1e4bf84988f2281131f52cd32796","status":"affected","version":"1b381a638e1851d8cfdfe08ed9cdbec5295b18c9","versionType":"git"},{"lessThan":"28fd8ac1d49389cb230d712116f54e27ebec11b8","status":"affected","version":"31a7a0bbeb006bac2d9c81a2874825025214b6d8","versionType":"git"},{"lessThan":"74badb9c20b1a9c02a95c735c6d3cd6121679c93","status":"affected","version":"31a7a0bbeb006bac2d9c81a2874825025214b6d8","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/net/ethernet/freescale/dpaa2/dpaa2-switch.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.19"},{"lessThan":"6.19","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.203","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.167","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.130","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.77","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.17","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.7","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.203","versionStartIncluding":"5.15.200","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.167","versionStartIncluding":"6.1.163","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.130","versionStartIncluding":"6.6.124","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.77","versionStartIncluding":"6.12.70","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.17","versionStartIncluding":"6.18.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.7","versionStartIncluding":"6.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.19","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler\n\nCommit 31a7a0bbeb00 (\"dpaa2-switch: add bounds check for if_id in IRQ\nhandler\") introduces a range check for if_id to avoid an out-of-bounds\naccess. If an out-of-bounds if_id is detected, the interrupt status is\nnot cleared. This may result in an interrupt storm.\n\nClear the interrupt status after detecting an out-of-bounds if_id to avoid\nthe problem.\n\nFound by an experimental AI code review agent at Google."}],"providerMetadata":{"dateUpdated":"2026-04-18T08:58:50.121Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/7def51cb9fb8b8d5342443372b8cf28d8fbd7f3d"},{"url":"https://git.kernel.org/stable/c/b5bababe7703a7322bc59b803ab1587887a2a5e4"},{"url":"https://git.kernel.org/stable/c/c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e"},{"url":"https://git.kernel.org/stable/c/fa4412cdc5178a48799bafcb8af28fd2fbf3d703"},{"url":"https://git.kernel.org/stable/c/00f42ace446f1e4bf84988f2281131f52cd32796"},{"url":"https://git.kernel.org/stable/c/28fd8ac1d49389cb230d712116f54e27ebec11b8"},{"url":"https://git.kernel.org/stable/c/74badb9c20b1a9c02a95c735c6d3cd6121679c93"}],"title":"dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-23422","datePublished":"2026-04-03T13:24:31.281Z","dateReserved":"2026-01-13T15:37:46.015Z","dateUpdated":"2026-04-18T08:58:50.121Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-03 14:16:28","lastModifiedDate":"2026-04-18 09:16:26","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"23422","Ordinal":"1","Title":"dpaa2-switch: Fix interrupt storm after receiving bad if_id in I","CVE":"CVE-2026-23422","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"23422","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ndpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler\n\nCommit 31a7a0bbeb00 (\"dpaa2-switch: add bounds check for if_id in IRQ\nhandler\") introduces a range check for if_id to avoid an out-of-bounds\naccess. If an out-of-bounds if_id is detected, the interrupt status is\nnot cleared. This may result in an interrupt storm.\n\nClear the interrupt status after detecting an out-of-bounds if_id to avoid\nthe problem.\n\nFound by an experimental AI code review agent at Google.","Type":"Description","Title":"dpaa2-switch: Fix interrupt storm after receiving bad if_id in I"}]}}}