Home

Description

In the Linux kernel, the following vulnerability has been resolved: can: mcp251x: fix deadlock in error path of mcp251x_open The mcp251x_open() function call free_irq() in its error path with the mpc_lock mutex held. But if an interrupt already occurred the interrupt handler will be waiting for the mpc_lock and free_irq() will deadlock waiting for the handler to finish. This issue is similar to the one fixed in commit 7dd9c26bd6cf ("can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open") but for the error path. To solve this issue move the call to free_irq() after the lock is released. Setting `priv->force_quit = 1` beforehand ensure that the IRQ handler will exit right away once it acquired the lock.

PUBLISHED Reserved 2026-01-13 | Published 2026-03-25 | Updated 2026-05-11 | Assigner Linux

Product status

Default status
unaffected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before 739454057572cb0948658d1142f3fa2c6966465c
affected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before 416c18ecddafab0ed09be1e7b9d2f448f3d4db16
affected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before 256f0cff6e946c570392bda1d01a65e789a7afd0
affected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before b73832292cd914e87a55e863ba4413a907e7db6b
affected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before 38063cc435b69d56e76f947c10d336fcb2953508
affected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before d27f12c3f5e85efc479896af4a69eccb37f75e8e
affected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before e728f444c913a91d290d1824b4770780bbd6378e
affected

bf66f3736a945dd4e92d86427276c6eeab0a6c1d (git) before ab3f894de216f4a62adc3b57e9191888cbf26885
affected

Default status
affected

2.6.34
affected

Any version before 2.6.34
unaffected

5.10.253 (semver)
unaffected

5.15.203 (semver)
unaffected

6.1.167 (semver)
unaffected

6.6.130 (semver)
unaffected

6.12.77 (semver)
unaffected

6.18.17 (semver)
unaffected

6.19.7 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/739454057572cb0948658d1142f3fa2c6966465c

git.kernel.org/...c/416c18ecddafab0ed09be1e7b9d2f448f3d4db16

git.kernel.org/...c/256f0cff6e946c570392bda1d01a65e789a7afd0

git.kernel.org/...c/b73832292cd914e87a55e863ba4413a907e7db6b

git.kernel.org/...c/38063cc435b69d56e76f947c10d336fcb2953508

git.kernel.org/...c/d27f12c3f5e85efc479896af4a69eccb37f75e8e

git.kernel.org/...c/e728f444c913a91d290d1824b4770780bbd6378e

git.kernel.org/...c/ab3f894de216f4a62adc3b57e9191888cbf26885

cve.org (CVE-2026-23357)

nvd.nist.gov (CVE-2026-23357)

Download JSON