CVE-2026-23422: In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: Fix interrupt storm after receiving b
infovulnerability
security
Summary
A Linux kernel component called dpaa2-switch had a bug where it would check if an invalid interface ID (if_id) was received but wouldn't clear the interrupt status (a signal that tells the system an event happened), causing the system to be repeatedly triggered by the same bad signal in what's called an interrupt storm (constant, repetitive alerts). The fix is to clear the interrupt status even when an invalid if_id is detected, preventing the repeated triggering.
Solution / Mitigation
Clear the interrupt status after detecting an out-of-bounds if_id to avoid the interrupt storm problem.
Vulnerability Details
EPSS (30-day exploit probability)
EPSS: 0.0%
Disclosure Date
April 3, 2026
Classification
Attack SophisticationModerate
Impact (CIA+S)
availability
Monthly digest — independent AI security research
Original source: https://nvd.nist.gov/vuln/detail/CVE-2026-23422
First tracked: April 3, 2026 at 02:07 PM
Classified by LLM (prompt v3) · confidence: 95%