Description
In the Linux kernel, the following vulnerability has been resolved:

net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown

A potential race condition exists in mana_hwc_destroy_channel() where
hwc->caller_ctx is freed before the HWC's Completion Queue (CQ) and
Event Queue (EQ) are destroyed. This allows an in-flight CQ interrupt
handler to dereference freed memory, leading to a use-after-free or
NULL pointer dereference in mana_hwc_handle_resp().

mana_smc_teardown_hwc() signals the hardware to stop but does not
synchronize against IRQ handlers already executing on other CPUs. The
IRQ synchronization only happens in mana_hwc_destroy_cq() via
mana_gd_destroy_eq() -> mana_gd_deregister_irq(). Since this runs
after kfree(hwc->caller_ctx), a concurrent mana_hwc_rx_event_handler()
can dereference freed caller_ctx (and rxq->msg_buf) in
mana_hwc_handle_resp().

Fix this by reordering teardown to reverse-of-creation order: destroy
the TX/RX work queues and CQ/EQ before freeing hwc->caller_ctx. This
ensures all in-flight interrupt handlers complete before the memory they
access is freed.
Published: 2026-04-03
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: Kernel memory corruption due to use‑after‑free
Action: Patch Required
AI Analysis

Impact

A race condition in the Linux kernel’s HWC mana subsystem allows an in‑flight CQ interrupt handler to access freed memory. The bug causes a use‑after‑free or NULL pointer dereference in mana_hwc_handle_resp(), potentially corrupting kernel data structures.

Affected Systems

All Linux kernel builds that include the mana wireless HWC driver and have not applied the commit that reorders teardown are affected. The vulnerability applies to any system on which this driver is loaded, with no specific distribution or kernel version enumerated.

Risk and Exploitability

The CVSS score of 7.0 indicates moderate severity. Exploitation requires a local attacker who can trigger the race condition by interacting with the HWC subsystem. The EPSS score is not available and the CVE is not listed in the KISA KEV catalog. The lack of a documented public exploit does not mitigate the inherent kernel memory corruption risk; it is inferred that a local attack vector would be required to exercise the vulnerability.

Generated by OpenCVE AI on April 4, 2026 at 04:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the commit fixing the mana HWC teardown order.
  • If a full kernel update is not immediately possible, apply the patch from the kernel repository to the affected driver and reboot to load the patched code.
  • Confirm the kernel version or patch status after updating to verify the vulnerability has been mitigated.

Generated by OpenCVE AI on April 4, 2026 at 04:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown A potential race condition exists in mana_hwc_destroy_channel() where hwc->caller_ctx is freed before the HWC's Completion Queue (CQ) and Event Queue (EQ) are destroyed. This allows an in-flight CQ interrupt handler to dereference freed memory, leading to a use-after-free or NULL pointer dereference in mana_hwc_handle_resp(). mana_smc_teardown_hwc() signals the hardware to stop but does not synchronize against IRQ handlers already executing on other CPUs. The IRQ synchronization only happens in mana_hwc_destroy_cq() via mana_gd_destroy_eq() -> mana_gd_deregister_irq(). Since this runs after kfree(hwc->caller_ctx), a concurrent mana_hwc_rx_event_handler() can dereference freed caller_ctx (and rxq->msg_buf) in mana_hwc_handle_resp(). Fix this by reordering teardown to reverse-of-creation order: destroy the TX/RX work queues and CQ/EQ before freeing hwc->caller_ctx. This ensures all in-flight interrupt handlers complete before the memory they access is freed.
Title net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:59:02.761Z

Reserved: 2026-01-13T15:37:46.020Z

Link: CVE-2026-23454

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:31.947

Modified: 2026-04-18T09:16:27.837

Link: CVE-2026-23454

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23454 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:17:25Z

Weaknesses