CVE-2026-23229

In the Linux kernel, the following vulnerability has been resolved: crypto: virtio - Add spinlock protection with virtqueue notification When VM boots with one virtio-crypto PCI device and builtin backend, run openssl benchmark command with multiple processes, such as openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32 openssl processes will hangup and there is error reported like this: virtio_crypto virtio0: dataq.0:id 3 is not a head! It seems that the data virtqueue need protection when it is handled for virtio done notification. If the spinlock protection is added in virtcrypto_done_task(), openssl benchmark with multiple processes works well.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Mar 2026, 13:25

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/49c57c6c108931a914ed94e3c0ddb974008260a3 - () https://git.kernel.org/stable/c/49c57c6c108931a914ed94e3c0ddb974008260a3 - Patch
References () https://git.kernel.org/stable/c/552475d0b6cece73a52c0fa5faa0ce45e99df74b - () https://git.kernel.org/stable/c/552475d0b6cece73a52c0fa5faa0ce45e99df74b - Patch
References () https://git.kernel.org/stable/c/8ee8ccfd60bf17cbdab91069d324b5302f4f3a30 - () https://git.kernel.org/stable/c/8ee8ccfd60bf17cbdab91069d324b5302f4f3a30 - Patch
References () https://git.kernel.org/stable/c/b505047ffc8057555900d2d3a005d033e6967382 - () https://git.kernel.org/stable/c/b505047ffc8057555900d2d3a005d033e6967382 - Patch
References () https://git.kernel.org/stable/c/c0a0ded3bb7fd45f720faa48449a930153257d3a - () https://git.kernel.org/stable/c/c0a0ded3bb7fd45f720faa48449a930153257d3a - Patch
References () https://git.kernel.org/stable/c/c9e594194795c86ca753ad6ed64c2762e9309d0d - () https://git.kernel.org/stable/c/c9e594194795c86ca753ad6ed64c2762e9309d0d - Patch
References () https://git.kernel.org/stable/c/d6f0d586808689963e58fd739bed626ff5013b24 - () https://git.kernel.org/stable/c/d6f0d586808689963e58fd739bed626ff5013b24 - Patch
References () https://git.kernel.org/stable/c/e69a7b0a71b6561b3b6459f1fded8d589f2e8ac2 - () https://git.kernel.org/stable/c/e69a7b0a71b6561b3b6459f1fded8d589f2e8ac2 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

23 Feb 2026, 04:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/b505047ffc8057555900d2d3a005d033e6967382 -
Summary
  • (es) Se ha resuelto la siguiente vulnerabilidad en el kernel de Linux: crypto: virtio - Añadir protección con spinlock con notificación de virtqueue Cuando una VM arranca con un dispositivo PCI virtio-crypto y un backend integrado, ejecutar el comando de benchmark de OpenSSL con múltiples procesos, como openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32 los procesos de OpenSSL se colgarán y se reporta un error como este: virtio_crypto virtio0: dataq.0:id 3 is not a head! Parece que el virtqueue de datos necesita protección cuando se maneja para la notificación de finalización de virtio. Si se añade la protección con spinlock en virtcrypto_done_task(), el benchmark de OpenSSL con múltiples procesos funciona correctamente.

19 Feb 2026, 16:27

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/552475d0b6cece73a52c0fa5faa0ce45e99df74b -
  • () https://git.kernel.org/stable/c/8ee8ccfd60bf17cbdab91069d324b5302f4f3a30 -
  • () https://git.kernel.org/stable/c/c9e594194795c86ca753ad6ed64c2762e9309d0d -

18 Feb 2026, 16:22

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 16:22

Updated : 2026-03-18 13:25


NVD link : CVE-2026-23229

Mitre link : CVE-2026-23229

CVE.ORG link : CVE-2026-23229


JSON object : View

Products Affected

linux

  • linux_kernel