CVE-2026-23071Race Condition in Linux

Severity
4.7MEDIUMNVD
EPSS
0.0%
top 97.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 4
Latest updateApr 16

Description

In the Linux kernel, the following vulnerability has been resolved: regmap: Fix race condition in hwspinlock irqsave routine Previously, the address of the shared member '&map->spinlock_flags' was passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race condition where multiple contexts contending for the lock could overwrite the shared flags variable, potentially corrupting the state for the current lock owner. Fix this by using a local stack variable 'flags' to store the IRQ st

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel4.155.10.249+6
Debianlinux/linux_kernel< 5.10.249-1+3
CVEListV5linux/linux8698b9364710e7bac84b3af07dd410e39c8c2e08e1a7072bc4f958c9e852dc7e57e39f12b0bb44b5+7

Patches

🔴Vulnerability Details

3
GHSA
GHSA-q825-wqg2-gxm8: In the Linux kernel, the following vulnerability has been resolved: regmap: Fix race condition in hwspinlock irqsave routine Previously, the address2026-02-04
OSV
CVE-2026-23071: In the Linux kernel, the following vulnerability has been resolved: regmap: Fix race condition in hwspinlock irqsave routine Previously, the address o2026-02-04
CVEList
regmap: Fix race condition in hwspinlock irqsave routine2026-02-04

📋Vendor Advisories

4
Ubuntu
Linux kernel vulnerabilities2026-04-16
Ubuntu
Linux kernel (NVIDIA Tegra) vulnerabilities2026-04-09
Red Hat
kernel: regmap: Fix race condition in hwspinlock irqsave routine2026-02-04
Debian
CVE-2026-23071: linux - In the Linux kernel, the following vulnerability has been resolved: regmap: Fix...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23071 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23071 — Race Condition in Linux | cvebase