CVE-2026-23071
In the Linux kernel, the following vulnerability has been resolved:
regmap: Fix race condition in hwspinlock irqsave routine
Previously, the address of the shared member '&map->spinlock_flags' was
passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race
condition where multiple contexts contending for the lock could overwrite
the shared flags variable, potentially corrupting the state for the
current lock owner.
Fix this by using a local stack variable 'flags' to store the IRQ state
temporarily.
regmap: Fix race condition in hwspinlock irqsave routine
Previously, the address of the shared member '&map->spinlock_flags' was
passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race
condition where multiple contexts contending for the lock could overwrite
the shared flags variable, potentially corrupting the state for the
current lock owner.
Fix this by using a local stack variable 'flags' to store the IRQ state
temporarily.
Vendor
Product
CWE
Yayın Tarihi
2026-02-04 17:16:17
Güncelleme
2026-03-18 17:29:14
Source Identifier
416baaa9-dc9f-4396-8d5f-8c081fb06d67
KEV Date Added
-
Kategoriler
Referanslar
https://git.kernel.org/stable/c/24f31be6ad70537fd7706269d99c92cade465a09
https://git.kernel.org/stable/c/4aab0ca0a0f7760e33edcb4e47576064d05128f5
https://git.kernel.org/stable/c/4b58aac989c1e3fafb1c68a733811859df388250
https://git.kernel.org/stable/c/766e243ae8c8b27087a4cc605752c0d5ee2daeab
https://git.kernel.org/stable/c/c2d2cf710dc3ee1a69e00b4ed8de607a92a07889
https://git.kernel.org/stable/c/e1a7072bc4f958c9e852dc7e57e39f12b0bb44b5
https://git.kernel.org/stable/c/f1e2fe26a51eca95b41420af76d22c2e613efd5e