Description
In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix potential deadlock in cpu hotplug with osnoise

The following sequence may leads deadlock in cpu hotplug:

task1 task2 task3
----- ----- -----

mutex_lock(&interface_lock)

[CPU GOING OFFLINE]

cpus_write_lock();
osnoise_cpu_die();
kthread_stop(task3);
wait_for_completion();

osnoise_sleep();
mutex_lock(&interface_lock);

cpus_read_lock();

[DEAD LOCK]

Fix by swap the order of cpus_read_lock() and mutex_lock(&interface_lock).
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via kernel deadlock
Action: Patch
AI Analysis

Impact

The Linux kernel tracing subsystem can deadlock during a CPU hotplug operation when a CPU is taken offline. The issue arises because the interface_lock mutex is acquired before the cpus_read_lock, which leads a thread to wait indefinitely after a cpu_die event. This lock ordering bug causes a kernel freeze and results in a denial‑of‑service condition that can halt all services running on the host.

Affected Systems

The flaw is present in Linux kernels that include the tracing and osnoise components before the commit that reordered the lock acquisition. No specific version range is listed, so any system built from mainline sources prior to the patch may be vulnerable, regardless of distribution or vendor.

Risk and Exploitability

The EPSS score is < 1%, indicating a low exploitation probability. The CVSS score of 5.5 denotes a medium severity. Based on the description, it is inferred that the attacker must be able to trigger a CPU hotplug event, which typically requires authenticated local or remote control of the node. Because the deadlock occurs inside the kernel, the impact is strictly availability; a kernel panic or prolonged stall will stop all processes. The likelihood of exploitation depends on the environment and the frequency of hotplug events, but the absence of a publicly available exploit reduces the immediate risk. Administrators should evaluate whether their systems undergo CPU hotplug and consider the vulnerability’s severity when planning remediation.

Generated by OpenCVE AI on April 28, 2026 at 15:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that reorders cpus_read_lock and mutex_lock during CPU hotplug operations
  • Upgrade to the latest stable Linux kernel that contains the fix
  • If an upgrade cannot be performed immediately, monitor for CPU hotplug events and restrict or disable hotplug until the patch is applied

Generated by OpenCVE AI on April 28, 2026 at 15:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Mon, 27 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-667
CPEs cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-833
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: tracing: Fix potential deadlock in cpu hotplug with osnoise The following sequence may leads deadlock in cpu hotplug: task1 task2 task3 ----- ----- ----- mutex_lock(&interface_lock) [CPU GOING OFFLINE] cpus_write_lock(); osnoise_cpu_die(); kthread_stop(task3); wait_for_completion(); osnoise_sleep(); mutex_lock(&interface_lock); cpus_read_lock(); [DEAD LOCK] Fix by swap the order of cpus_read_lock() and mutex_lock(&interface_lock).
Title tracing: Fix potential deadlock in cpu hotplug with osnoise
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:09:32.978Z

Reserved: 2026-03-09T15:48:24.100Z

Link: CVE-2026-31480

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T14:16:45.170

Modified: 2026-04-27T23:17:03.873

Link: CVE-2026-31480

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31480 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T15:45:06Z

Weaknesses