CVE-2026-23071

In the Linux kernel, the following vulnerability has been resolved: regmap: Fix race condition in hwspinlock irqsave routine Previously, the address of the shared member '&map->spinlock_flags' was passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race condition where multiple contexts contending for the lock could overwrite the shared flags variable, potentially corrupting the state for the current lock owner. Fix this by using a local stack variable 'flags' to store the IRQ state temporarily.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

18 Mar 2026, 17:29

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: regmap: Corrección de condición de carrera en la rutina hwspinlock irqsave Anteriormente, la dirección del miembro compartido '&map->spinlock_flags' se pasaba directamente a 'hwspin_lock_timeout_irqsave'. Esto crea una condición de carrera donde múltiples contextos que compiten por el bloqueo podrían sobrescribir la variable de banderas compartida, potencialmente corrompiendo el estado para el propietario actual del bloqueo. Esto se soluciona usando una variable local de pila 'flags' para almacenar temporalmente el estado IRQ.
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/24f31be6ad70537fd7706269d99c92cade465a09 - () https://git.kernel.org/stable/c/24f31be6ad70537fd7706269d99c92cade465a09 - Patch
References () https://git.kernel.org/stable/c/4aab0ca0a0f7760e33edcb4e47576064d05128f5 - () https://git.kernel.org/stable/c/4aab0ca0a0f7760e33edcb4e47576064d05128f5 - Patch
References () https://git.kernel.org/stable/c/4b58aac989c1e3fafb1c68a733811859df388250 - () https://git.kernel.org/stable/c/4b58aac989c1e3fafb1c68a733811859df388250 - Patch
References () https://git.kernel.org/stable/c/766e243ae8c8b27087a4cc605752c0d5ee2daeab - () https://git.kernel.org/stable/c/766e243ae8c8b27087a4cc605752c0d5ee2daeab - Patch
References () https://git.kernel.org/stable/c/c2d2cf710dc3ee1a69e00b4ed8de607a92a07889 - () https://git.kernel.org/stable/c/c2d2cf710dc3ee1a69e00b4ed8de607a92a07889 - Patch
References () https://git.kernel.org/stable/c/e1a7072bc4f958c9e852dc7e57e39f12b0bb44b5 - () https://git.kernel.org/stable/c/e1a7072bc4f958c9e852dc7e57e39f12b0bb44b5 - Patch
References () https://git.kernel.org/stable/c/f1e2fe26a51eca95b41420af76d22c2e613efd5e - () https://git.kernel.org/stable/c/f1e2fe26a51eca95b41420af76d22c2e613efd5e - Patch

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/766e243ae8c8b27087a4cc605752c0d5ee2daeab -
  • () https://git.kernel.org/stable/c/e1a7072bc4f958c9e852dc7e57e39f12b0bb44b5 -
  • () https://git.kernel.org/stable/c/f1e2fe26a51eca95b41420af76d22c2e613efd5e -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-03-18 17:29


NVD link : CVE-2026-23071

Mitre link : CVE-2026-23071

CVE.ORG link : CVE-2026-23071


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')