Description
In the Linux kernel, the following vulnerability has been resolved:

dpaa2-switch: add bounds check for if_id in IRQ handler

The IRQ handler extracts if_id from the upper 16 bits of the hardware
status register and uses it to index into ethsw->ports[] without
validation. Since if_id can be any 16-bit value (0-65535) but the ports
array is only allocated with sw_attr.num_ifs elements, this can lead to
an out-of-bounds read potentially.

Add a bounds check before accessing the array, consistent with the
existing validation in dpaa2_switch_rx().
Published: 2026-02-14
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

In the Linux kernel, the dpaa2‑switch driver extracts an interface identifier from the upper 16 bits of a hardware status register and indexes into an internal ports array without validating that the identifier is within bounds. Because the if_id value can be any 16‑bit number while the array is sized only to the number of configured interfaces, an out‑of‑bounds read can occur. This flaw may expose kernel memory contents or cause a crash, potentially allowing an attacker to glean sensitive information.

Affected Systems

The vulnerability exists in the Linux kernel’s dpaa2‑switch module. Any kernel containing the unpatched dpaa2‑switch code, regardless of release level, is affected. The issue is not limited to a single kernel version; all builds from the time the code was introduced up to the date of the patch are vulnerable.

Risk and Exploitability

The flaw carries a CVSS base score of 7.0, indicating moderate severity. The EPSS score is under 1 %, reflecting a very low exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation would likely require local or privileged access to a device that triggers the dpaa2‑switch IRQ handler, making it practical mainly for attackers with physical or kernel-level access.

Generated by OpenCVE AI on April 15, 2026 at 20:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that includes the dpaa2‑switch bounds‑check patch (commits referenced in the advisory).
  • If a kernel update cannot be made immediately, disable the dpaa2‑switch driver or the associated device to prevent the vulnerable IRQ handler from executing.
  • Monitor system logs for signs of out‑of‑bounds read attempts and configure audit rules to flag repeated access to critical registers.

Generated by OpenCVE AI on April 15, 2026 at 20:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4499-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6141-1 linux security update
Debian DSA Debian DSA DSA-6163-1 linux security update
History

Wed, 15 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125

Tue, 17 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Sat, 14 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: add bounds check for if_id in IRQ handler The IRQ handler extracts if_id from the upper 16 bits of the hardware status register and uses it to index into ethsw->ports[] without validation. Since if_id can be any 16-bit value (0-65535) but the ports array is only allocated with sw_attr.num_ifs elements, this can lead to an out-of-bounds read potentially. Add a bounds check before accessing the array, consistent with the existing validation in dpaa2_switch_rx().
Title dpaa2-switch: add bounds check for if_id in IRQ handler
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T13:32:19.605Z

Reserved: 2026-01-13T15:37:45.984Z

Link: CVE-2026-23180

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-14T17:15:55.747

Modified: 2026-04-15T14:34:27.800

Link: CVE-2026-23180

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-14T00:00:00Z

Links: CVE-2026-23180 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:45:06Z

Weaknesses