VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54326

CVE-2023-54326

Description

In the Linux kernel, the following vulnerability has been resolved:

misc: pci_endpoint_test: Free IRQs before removing the device

In pci_endpoint_test_remove(), freeing the IRQs after removing the device creates a small race window for IRQs to be received with the test device memory already released, causing the IRQ handler to access invalid memory, resulting in an oops.

Free the device IRQs before removing the device to avoid this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A race condition in the Linux kernel's pci_endpoint_test driver can cause a use-after-free oops when IRQs fire after device removal.

Vulnerability

In the Linux kernel, the pci_endpoint_test driver suffers from a use-after-free race condition. The flaw occurs in the pci_endpoint_test_remove() function, which frees IRQs after removing the PCI endpoint test device. This creates a small window where an IRQ can be received after the device's memory has already been released, causing the IRQ handler to access invalid memory and resulting in a kernel oops. [1]

Exploitation

Exploitation requires the ability to trigger the removal of the PCI endpoint test device while an IRQ is pending. The attacker must have local access to the system and the capability to unload the driver or perform a hot-unplug of the device. No authentication is required beyond the ability to interact with the driver's removal path. The race window is small, making exploitation difficult but not impossible. [2]

Impact

A successful exploit leads to a kernel crash (oops), resulting in a denial of service (DoS) condition. The attacker does not gain code execution or privilege escalation; the primary impact is system instability and availability loss. [3]

Mitigation

The fix, merged into the Linux kernel stable branches, moves the IRQ freeing to occur before device removal, closing the race window. Administrators should update to a kernel version containing the patch. No workaround exists other than applying the update. [4]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.