VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53850

CVE-2023-53850

Description

In the Linux kernel, the following vulnerability has been resolved:

iavf: use internal state to free traffic IRQs

If the system tries to close the netdev while iavf_reset_task() is running, __LINK_STATE_START will be cleared and netif_running() will return false in iavf_reinit_interrupt_scheme(). This will result in iavf_free_traffic_irqs() not being called and a leak as follows:

[7632.489326] remove_proc_entry: removing non-empty directory 'irq/999', leaking at least 'iavf-enp24s0f0v0-TxRx-0' [7632.490214] WARNING: CPU: 0 PID: 10 at fs/proc/generic.c:718 remove_proc_entry+0x19b/0x1b0

is shown when pci_disable_msix() is later called. Fix by using the internal adapter state. The traffic IRQs will always exist if state == __IAVF_RUNNING.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A race condition in the Linux kernel's iavf driver can leak procfs entries when closing the netdev during a reset task.

Root

Cause

A race condition exists in the Intel Ethernet Adaptive Virtual Function (iavf) driver. When the system closes the network device (netdev) while iavf_reset_task() is running, the __LINK_STATE_START flag is cleared, causing netif_running() to return false inside iavf_reinit_interrupt_scheme(). Consequently, iavf_free_traffic_irqs() is not called, leaving IRQ procfs entries behind.[1]

Exploitation

No special privileges are required; an administrator or a local user with sufficient permissions to trigger device resets or network interface changes could inadvertently trigger the race. The issue occurs during normal operation when a reset task is in progress and the interface is closed simultaneously.[1]

Impact

When the driver later calls pci_disable_msix(), the stale procfs entries cause a kernel warning (remove_proc_entry: removing non-empty directory) and a memory leak. This degrades system stability and may fill kernel logs with warnings, though it does not directly allow code execution or privilege escalation.[1]

Mitigation

The fix replaces reliance on netif_running() with an internal adapter state check: traffic IRQs are freed if the state is __IAVF_RUNNING. The patch is included in Linux kernel stable updates. Users should apply the latest kernel updates from their distribution.[1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.