In the Linux kernel, the following vulnerability has been resolved:
regmap: Fix race condition in hwspinlock irqsave routine
Previously, the address of the shared member '&map->spinlock_flags' was
passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race
condition where multiple contexts contending for the lock could overwrite
the shared flags variable, potentially corrupting the state for the
current lock owner.
Fix this by using a local stack variable 'flags' to store the IRQ state
temporarily.
References
Configurations
Configuration 1 (hide)
|
History
18 Mar 2026, 17:29
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CWE | CWE-362 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/24f31be6ad70537fd7706269d99c92cade465a09 - Patch | |
| References | () https://git.kernel.org/stable/c/4aab0ca0a0f7760e33edcb4e47576064d05128f5 - Patch | |
| References | () https://git.kernel.org/stable/c/4b58aac989c1e3fafb1c68a733811859df388250 - Patch | |
| References | () https://git.kernel.org/stable/c/766e243ae8c8b27087a4cc605752c0d5ee2daeab - Patch | |
| References | () https://git.kernel.org/stable/c/c2d2cf710dc3ee1a69e00b4ed8de607a92a07889 - Patch | |
| References | () https://git.kernel.org/stable/c/e1a7072bc4f958c9e852dc7e57e39f12b0bb44b5 - Patch | |
| References | () https://git.kernel.org/stable/c/f1e2fe26a51eca95b41420af76d22c2e613efd5e - Patch |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 17:16
Updated : 2026-03-18 17:29
NVD link : CVE-2026-23071
Mitre link : CVE-2026-23071
CVE.ORG link : CVE-2026-23071
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
