CVE-2026-23287

Source
https://cve.org/CVERecord?id=CVE-2026-23287
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23287.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23287
Downstream
Published
2026-03-25T10:26:46.363Z
Modified
2026-04-14T03:48:10.804243Z
Summary
irqchip/sifive-plic: Fix frozen interrupt due to affinity setting
Details

In the Linux kernel, the following vulnerability has been resolved:

irqchip/sifive-plic: Fix frozen interrupt due to affinity setting

PLIC ignores interrupt completion message for disabled interrupt, explained by the specification:

The PLIC signals it has completed executing an interrupt handler by
writing the interrupt ID it received from the claim to the
claim/complete register. The PLIC does not check whether the completion
ID is the same as the last claim ID for that target. If the completion
ID does not match an interrupt source that is currently enabled for
the target, the completion is silently ignored.

This caused problems in the past, because an interrupt can be disabled while still being handled and plicirqeoi() had no effect. That was fixed by checking if the interrupt is disabled, and if so enable it, before sending the completion message. That check is done with irqdirqdisabled().

However, that is not sufficient because the enable bit for the handling hart can be zero despite irqdirqdisabled(d) being false. This can happen when affinity setting is changed while a hart is still handling the interrupt.

This problem is easily reproducible by dumping a large file to uart (which generates lots of interrupts) and at the same time keep changing the uart interrupt's affinity setting. The uart port becomes frozen almost instantaneously.

Fix this by checking PLIC's enable bit instead of irqdirqdisabled().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23287.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cc9f04f9a84f745949e325661550ed14bd0ff322
Fixed
8942fb1a5bc2dcbd88f7e656d109d42f778f298f
Fixed
2edbd173309165d103be6c73bd83e459dc45ae7b
Fixed
686eb378a4a51aa967e08337dd59daade16aec0f
Fixed
1883332bf21feb8871af09daf604fc4836a76925
Fixed
f611791a927141d05d7030607dea6372311c1413
Fixed
1072020685f4b81f6efad3b412cdae0bd62bb043

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23287.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
6.1.167
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23287.json"