CVE-2023-54326
Description
In the Linux kernel, the following vulnerability has been resolved:
misc: pci_endpoint_test: Free IRQs before removing the device
In pci_endpoint_test_remove(), freeing the IRQs after removing the device creates a small race window for IRQs to be received with the test device memory already released, causing the IRQ handler to access invalid memory, resulting in an oops.
Free the device IRQs before removing the device to avoid this issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in the Linux kernel's pci_endpoint_test driver can cause a use-after-free oops when IRQs fire after device removal.
Vulnerability
In the Linux kernel, the pci_endpoint_test driver suffers from a use-after-free race condition. The flaw occurs in the pci_endpoint_test_remove() function, which frees IRQs after removing the PCI endpoint test device. This creates a small window where an IRQ can be received after the device's memory has already been released, causing the IRQ handler to access invalid memory and resulting in a kernel oops. [1]
Exploitation
Exploitation requires the ability to trigger the removal of the PCI endpoint test device while an IRQ is pending. The attacker must have local access to the system and the capability to unload the driver or perform a hot-unplug of the device. No authentication is required beyond the ability to interact with the driver's removal path. The race window is small, making exploitation difficult but not impossible. [2]
Impact
A successful exploit leads to a kernel crash (oops), resulting in a denial of service (DoS) condition. The attacker does not gain code execution or privilege escalation; the primary impact is system instability and availability loss. [3]
Mitigation
The fix, merged into the Linux kernel stable branches, moves the IRQ freeing to occur before device removal, closing the race window. Administrators should update to a kernel version containing the patch. No workaround exists other than applying the update. [4]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
7fb7f8bdb886fdd2210379205cdf9a7e2cdc714bdee38e96cc2dba13bc0c638d12bcf4e2cf61b7634a324Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/14bdee38e96c7d37ca15e7bea50411eee25fe315nvd
- git.kernel.org/stable/c/38d12bcf4e2ce3d285eb29644a79a54f42040fabnvd
- git.kernel.org/stable/c/c2dba13bc0c62b79a3cbe4bfe5faa32231bf9b55nvd
- git.kernel.org/stable/c/cdf9a7e2cdc7a5464e3cc6d0b715ba2b1d215521nvd
- git.kernel.org/stable/c/dd2210379205fcd23a9d8869b0cef90e3770577cnvd
- git.kernel.org/stable/c/f61b7634a3249d12b9daa36ffbdb9965b6f24c6cnvd
- git.kernel.org/stable/c/fb7f8bdb886f2ebf35ee5edaf2bf5f02b063ddb7nvd
News mentions
0No linked articles in our index yet.