Description
In the Linux kernel, the following vulnerability has been resolved:

mfd: core: Add locking around 'mfd_of_node_list'

Manipulating a list in the kernel isn't safe without some sort of
mutual exclusion. Add a mutex any time we access / modify
'mfd_of_node_list' to prevent possible crashes.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from concurrent manipulation of the kernel list ‘mfd_of_node_list’ without adequate mutual exclusion, creating a race condition that can lead to kernel crashes. The attacker can trigger this defect by inducing concurrent accesses, which would compromise integrity and availability of the affected system. The weakness corresponds to poor synchronization in shared data structures, a classic scenario that can culminate in a denial‑of‑service state but does not provide code execution.

Affected Systems

All Linux kernel versions susceptible to this race condition. The exact affected releases are not enumerated in the available data, but any distribution using a kernel built before the commit that added the mutex would be vulnerable.

Risk and Exploitability

The enterprise risk is high because a local or privileged attacker could force the kernel to crash, rendering the host unusable. No EPSS value is available, and the vulnerability is not listed in CISA’s KEV catalog. While the CVSS score is not supplied, the nature of the flaw—kernel race leading to a catastrophic crash—implies a severity level typically in the 8–9 range. The typical attack vector is local privilege escalation or malicious use of a kernel module that accesses the multi-function device subsystem, though the exact prerequisites are not detailed in the description.

Generated by OpenCVE AI on May 6, 2026 at 14:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that includes the added mutex around ‘mfd_of_node_list’
  • Monitor system logs for kernel panic indicators (e.g., dmesg, systemd journal) to detect remaining race conditions
  • If updating the kernel is not immediately possible, restrict or remove the multi‑function device subsystem from the build or configuration to eliminate the vulnerable list access

Generated by OpenCVE AI on May 6, 2026 at 14:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362
CWE-472

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mfd: core: Add locking around 'mfd_of_node_list' Manipulating a list in the kernel isn't safe without some sort of mutual exclusion. Add a mutex any time we access / modify 'mfd_of_node_list' to prevent possible crashes.
Title mfd: core: Add locking around 'mfd_of_node_list'
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:27.506Z

Reserved: 2026-05-01T14:12:55.989Z

Link: CVE-2026-43143

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:31.747

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43143

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T15:15:07Z

Weaknesses