In the Linux kernel, the following vulnerability has been resolved:
iavf: use internal state to free traffic IRQs
If the system tries to close the netdev while iavfresettask() is running, _LINKSTATESTART will be cleared and netifrunning() will return false in iavfreinitinterruptscheme(). This will result in iavffreetrafficirqs() not being called and a leak as follows:
[7632.489326] remove_proc_entry: removing non-empty directory 'irq/999', leaking at least 'iavf-enp24s0f0v0-TxRx-0'
[7632.490214] WARNING: CPU: 0 PID: 10 at fs/proc/generic.c:718 remove_proc_entry+0x19b/0x1b0
is shown when pcidisablemsix() is later called. Fix by using the internal adapter state. The traffic IRQs will always exist if state == _IAVFRUNNING.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53850.json",
"cna_assigner": "Linux"
}