CVE-2026-23071 — Race Condition in Linux
Severity
4.7MEDIUMNVD
EPSS
0.0%
top 97.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 4
Latest updateApr 16
Description
In the Linux kernel, the following vulnerability has been resolved:
regmap: Fix race condition in hwspinlock irqsave routine
Previously, the address of the shared member '&map->spinlock_flags' was
passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race
condition where multiple contexts contending for the lock could overwrite
the shared flags variable, potentially corrupting the state for the
current lock owner.
Fix this by using a local stack variable 'flags' to store the IRQ st…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6
Affected Packages3 packages
▶CVEListV5linux/linux8698b9364710e7bac84b3af07dd410e39c8c2e08 — e1a7072bc4f958c9e852dc7e57e39f12b0bb44b5+7
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-q825-wqg2-gxm8: In the Linux kernel, the following vulnerability has been resolved:
regmap: Fix race condition in hwspinlock irqsave routine
Previously, the address↗2026-02-04
OSV▶
CVE-2026-23071: In the Linux kernel, the following vulnerability has been resolved: regmap: Fix race condition in hwspinlock irqsave routine Previously, the address o↗2026-02-04
📋Vendor Advisories
4Debian▶
CVE-2026-23071: linux - In the Linux kernel, the following vulnerability has been resolved: regmap: Fix...↗2026