Improper locking in Linux kernel - CVE-2026-43227
Published: May 7, 2026
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper lock handling in the sh_tmu clocksource driver when managing power state and clocks during clockevent operations. A local user can trigger clockevent activity to cause a denial of service.
This issue is relevant on PREEMPT_RT builds, where normal spinlocks can sleep and the lock context mismatch may become problematic.
Remediation
External links
- https://git.kernel.org/stable/c/016476afef993d1201a19decc9b5b2ea1e6620f2
- https://git.kernel.org/stable/c/0e513cc6b9cea190fe342cc222b1054e7e8acfc8
- https://git.kernel.org/stable/c/6f113ab549b864c1bc57d4f89846ee335394089a
- https://git.kernel.org/stable/c/79d650695773f03de36b99228a090d33d1c18264
- https://git.kernel.org/stable/c/88c76792180dffd83f1c5b9dc8fdaeb145cb94e0
- https://git.kernel.org/stable/c/b1278972b08e480990e2789bdc6a7c918bc349be
- https://git.kernel.org/stable/c/bc59d5f3afe41fec5d673c27c703b761ae578d28
- https://git.kernel.org/stable/c/f0b31247e7d67a943b3a09d3cef7c0ae788d88e6