CVE-2026-23106
Race Condition in Linux Kernel Timekeeping Causes Incorrect Updates
Publication date: 2026-02-04
Last updated on: 2026-03-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.17 (inc) to 6.18.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's timekeeping subsystem. Specifically, when the function __do_adjtimex() was introduced to handle adjtimex calls for any timekeeper, it failed to update the correct reference for auxiliary timekeepers. Instead, it incorrectly updated the core timekeeper. This caused the timekeepers sequence lock to be written to without holding its associated spinlock, which is a synchronization error detected by lock debugging diagnostics.
How can this vulnerability impact me? :
The vulnerability can lead to incorrect updates in the timekeeping subsystem of the Linux kernel, potentially causing synchronization issues or race conditions. This may result in system instability or unexpected behavior related to time adjustments. Additionally, the lock debugging diagnostics warning indicates a concurrency control problem that could affect system reliability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel lock debugging diagnostics for warnings related to timekeeper sequence locks being written without holding the associated spinlock.
Specifically, look for kernel warnings similar to: "WARNING: include/linux/seqlock.h:226 at __do_adjtimex+0x394/0x3b0" indicating improper updates to the auxiliary timekeeper.
You can check the kernel logs using commands such as:
- dmesg | grep -i seqlock
- journalctl -k | grep -i seqlock
- journalctl -k | grep -i adjtimex
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where this vulnerability has been fixed.
The fix involves correcting the reference to the auxiliary timekeeper in the __do_ajdtimex() function to ensure proper locking and timekeeper updates.
Until the kernel is updated, monitoring for the described kernel warnings can help detect exploitation attempts.