Description
In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: serialize lock/unlock against other NAND operations

nand_lock() and nand_unlock() call into chip->ops.lock_area/unlock_area
without holding the NAND device lock. On controllers that implement
SET_FEATURES via multiple low-level PIO commands, these can race with
concurrent UBI/UBIFS background erase/write operations that hold the
device lock, resulting in cmd_pending conflicts on the NAND controller.

Add nand_get_device()/nand_release_device() around the lock/unlock
operations to serialize them against all other NAND controller access.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential Data Corruption
Action: Apply Update
AI Analysis

Impact

In the Linux kernel, a race condition occurs when nand_lock() and nand_unlock() are executed without holding the NAND device lock. This allows concurrent UBI/UBIFS background operations to overlap with SET_FEATURES commands that use multiple PIO operations, producing cmd_pending conflicts that can corrupt NAND transactions or cause system instability. The flaw is a concurrency weakness (CWE‑362) that may compromise data integrity.

Affected Systems

The vulnerability affects all Linux kernel builds that include the MTD raw NAND subsystem on controllers that use multi‑PIO SET_FEATURES, especially those operating UBI/UBIFS file systems. No specific kernel version is listed, so any release before the patch that adds nand_get_device()/nand_release_device() around lock/unlock is considered vulnerable.

Risk and Exploitability

No CVSS or EPSS data is available and the flaw is not in CISA's KEV catalog. Exploitation would require precursor kernel‑level access to trigger concurrent NAND operations, meaning an attacker would need to run privileged software or firmware. The potential impact is data corruption or denial of service, but the attack vector is limited to high‑permission context rather than external exploitation.

Generated by OpenCVE AI on April 3, 2026 at 18:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a release that includes the patch adding nand_get_device()/nand_release_device() around nand_lock() and nand_unlock() calls.
  • If an immediate kernel update is not possible, consider disabling or reducing background UBI/UBIFS writes and erases during critical periods to minimise lock contention.
  • Watch for NAND controller errors and verify data integrity after applying any changes.

Generated by OpenCVE AI on April 3, 2026 at 18:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-820
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: serialize lock/unlock against other NAND operations nand_lock() and nand_unlock() call into chip->ops.lock_area/unlock_area without holding the NAND device lock. On controllers that implement SET_FEATURES via multiple low-level PIO commands, these can race with concurrent UBI/UBIFS background erase/write operations that hold the device lock, resulting in cmd_pending conflicts on the NAND controller. Add nand_get_device()/nand_release_device() around the lock/unlock operations to serialize them against all other NAND controller access.
Title mtd: rawnand: serialize lock/unlock against other NAND operations
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:19.450Z

Reserved: 2026-01-13T15:37:46.016Z

Link: CVE-2026-23434

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:24.913

Modified: 2026-04-03T16:16:24.913

Link: CVE-2026-23434

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23434 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:17Z

Weaknesses