Description
In the Linux kernel, the following vulnerability has been resolved:

clockevents: Add missing resets of the next_event_forced flag

The prevention mechanism against timer interrupt starvation missed to reset
the next_event_forced flag in a couple of places:

- When the clock event state changes. That can cause the flag to be
stale over a shutdown/startup sequence

- When a non-forced event is armed, which then prevents rearming before
that event. If that event is far out in the future this will cause
missed timer interrupts.

- In the suspend wakeup handler.

That led to stalls which have been reported by several people.

Add the missing resets, which fixes the problems for the reporters.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (system stalls)
Action: Update Kernel
AI Analysis

Impact

In the Linux kernel a missing reset of the next_event_forced flag within the clockevents subsystem caused the flag to remain stale in several code paths. When the flag persisted, scheduled timer interrupts were unintentionally suppressed, leading to periods where the system waited for a forced event that never arrived. This manifested as visible system stalls and degraded responsiveness.

Affected Systems

The flaw is confined to the Linux kernel itself. All kernel versions that contained the buggy clockevents implementation before the patch are potentially affected. The exact release range is not specified, so any kernel lacking the provided commit to reset next_event_forced in the described paths is at risk.

Risk and Exploitability

The CVSS score of 5.5 indicates a medium severity and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to trigger a circular reset or initiate a reboot sequence on a system that has not yet applied the patch. With local or root access, invoking the stale flag path could force the kernel into a state of missing timer interrupts, effectively denying service to user applications that rely on timely scheduling. No public exploit so far has been reported, so the risk remains mainly theoretical but not negligible.

Generated by OpenCVE AI on April 28, 2026 at 14:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to the latest stable release that contains the commit resetting the next_event_forced flag, or apply the patch manually to the kernel source.
  • Reboot the system so that the flag is cleared and the new code path is active.
  • Run a suite of latency or CPU‑bound tests (e.g., stress-ng, perf) to confirm that timers fire correctly and that no new stalls occur.

Generated by OpenCVE AI on April 28, 2026 at 14:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:linux:linux_kernel:7.0:-:*:*:*:*:*:*

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo

Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-821
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: clockevents: Add missing resets of the next_event_forced flag The prevention mechanism against timer interrupt starvation missed to reset the next_event_forced flag in a couple of places: - When the clock event state changes. That can cause the flag to be stale over a shutdown/startup sequence - When a non-forced event is armed, which then prevents rearming before that event. If that event is far out in the future this will cause missed timer interrupts. - In the suspend wakeup handler. That led to stalls which have been reported by several people. Add the missing resets, which fixes the problems for the reporters.
Title clockevents: Add missing resets of the next_event_forced flag
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:11:25.300Z

Reserved: 2026-03-09T15:48:24.119Z

Link: CVE-2026-31574

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:32.020

Modified: 2026-05-19T14:22:43.347

Link: CVE-2026-31574

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31574 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:15:34Z

Weaknesses