CVE-2026-23186
Deadlock Vulnerability in Linux Kernel acpi_power_meter Driver
Publication date: 2026-02-14
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.15 (inc) to 6.18.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's acpi_power_meter driver, specifically in its .notify() callback function called acpi_power_meter_notify(). The function calls hwmon_device_unregister() while holding a lock that is also acquired by other callbacks related to sysfs attributes of the device being unregistered. This situation can cause deadlocks between sysfs access and device removal.
The fix involves moving the device removal call outside the problematic lock and adding a new static mutex lock to serialize execution within the notify function. This prevents concurrent attempts to remove the same device simultaneously and ensures proper ordering of firmware notifications and netlink messages. Additional checks were added to handle failure cases when registering the hwmon device.
How can this vulnerability impact me? :
This vulnerability can lead to deadlocks in the Linux kernel when the acpi_power_meter driver is handling device notifications and sysfs attribute accesses concurrently. Such deadlocks can cause system hangs or unresponsiveness, potentially impacting system stability and availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
This vulnerability is related to deadlocks in the acpi_power_meter driver in the Linux kernel. To mitigate it, you should update your Linux kernel to a version where this issue has been fixed.
The fix involves changes to the acpi_power_meter_notify() function to avoid deadlocks by moving device removal outside of a lock and adding a new static mutex to serialize notifications.
Therefore, applying the latest kernel patches or upgrading to a kernel version that includes this fix is the immediate step to prevent the deadlocks caused by this vulnerability.