CVE-2026-23101
Race Condition in Linux Kernel LED Class Causing Workqueue Crash
Publication date: 2026-02-04
Last updated on: 2026-03-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 3.7 (inc) to 5.10.249 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's LED subsystem. Specifically, an LED device was being added to the leds_list before it was fully initialized by the led_init_core() function. This premature addition allowed the LED's default trigger to call functions that operated on an uninitialized work structure (set_brightness_work), leading to potential kernel warnings or crashes.
The issue was triggered by the lenovo-thinkpad-t14s EC driver which registers two LEDs with a default trigger in quick succession. The asynchronous loading of the snd_ctl_led module could hit the timing window where the second LED was on the leds_list but not fully initialized, causing a kernel warning and instability.
The fix involved moving the addition of the LED to the leds_list until after the led_init_core() function completes, closing the race window.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and potentially system instability or crashes due to the race condition in LED initialization. Systems using affected drivers, such as the lenovo-thinkpad-t14s EC driver, may experience unexpected behavior or reliability issues when the LED subsystem triggers work on uninitialized structures.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a race condition in the Linux kernel's LED subsystem, which can cause warnings or errors related to workqueue flushing and LED trigger registration.
Detection can involve monitoring kernel logs for warning messages similar to the following:
- WARNING: CPU: ... at kernel/workqueue.c:4234 __flush_work+0x344/0x390
- Call trace entries involving led_trigger_set, led_trigger_register, snd_ctl_led_init, and load_module
You can check kernel logs using commands like:
- dmesg | grep -i 'led_trigger_set'
- journalctl -k | grep -i 'flush_work'
- journalctl -k | grep -i 'snd_ctl_led'
Additionally, reviewing the presence and initialization order of LED devices and their triggers in the system may help identify if the vulnerable code path is exercised.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by ensuring that LEDs are only added to the leds_list after their core initialization (led_init_core) is complete, preventing the race condition.
Immediate mitigation steps include:
- Update the Linux kernel to a version that includes the fix where the LED is added to leds_list only after led_init_core() is called.
- If updating the kernel is not immediately possible, consider disabling or unloading the snd_ctl_led module or any related LED triggers that may trigger this race condition.
- Monitor kernel logs for related warnings to detect if the issue is occurring.
Ultimately, applying the official patch or upgrading to a fixed kernel version is the recommended and most effective mitigation.