CVE-2023-53850
Description
In the Linux kernel, the following vulnerability has been resolved:
iavf: use internal state to free traffic IRQs
If the system tries to close the netdev while iavf_reset_task() is running, __LINK_STATE_START will be cleared and netif_running() will return false in iavf_reinit_interrupt_scheme(). This will result in iavf_free_traffic_irqs() not being called and a leak as follows:
[7632.489326] remove_proc_entry: removing non-empty directory 'irq/999', leaking at least 'iavf-enp24s0f0v0-TxRx-0' [7632.490214] WARNING: CPU: 0 PID: 10 at fs/proc/generic.c:718 remove_proc_entry+0x19b/0x1b0
is shown when pci_disable_msix() is later called. Fix by using the internal adapter state. The traffic IRQs will always exist if state == __IAVF_RUNNING.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in the Linux kernel's iavf driver can leak procfs entries when closing the netdev during a reset task.
Root
Cause
A race condition exists in the Intel Ethernet Adaptive Virtual Function (iavf) driver. When the system closes the network device (netdev) while iavf_reset_task() is running, the __LINK_STATE_START flag is cleared, causing netif_running() to return false inside iavf_reinit_interrupt_scheme(). Consequently, iavf_free_traffic_irqs() is not called, leaving IRQ procfs entries behind.[1]
Exploitation
No special privileges are required; an administrator or a local user with sufficient permissions to trigger device resets or network interface changes could inadvertently trigger the race. The issue occurs during normal operation when a reset task is in progress and the interface is closed simultaneously.[1]
Impact
When the driver later calls pci_disable_msix(), the stale procfs entries cause a kernel warning (remove_proc_entry: removing non-empty directory) and a memory leak. This degrades system stability and may fill kernel logs with warnings, though it does not directly allow code execution or privilege escalation.[1]
Mitigation
The fix replaces reliance on netif_running() with an internal adapter state check: traffic IRQs are freed if the state is __IAVF_RUNNING. The patch is included in Linux kernel stable updates. Users should apply the latest kernel updates from their distribution.[1]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
36d9d01689b825e9db32eec62a77ed5c5b768Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.