Linux Kernel EUVD-2026-24839

| CVE-2026-31480 MEDIUM
Improper Locking (CWE-667)
2026-04-22 416baaa9-dc9f-4396-8d5f-8c081fb06d67 GHSA-mvjq-gq62-vxrr
5.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 28, 2026 - 01:30 vuln.today
CVSS changed
Apr 27, 2026 - 23:22 NVD
5.5 (MEDIUM)
Patch available
Apr 22, 2026 - 16:33 EUVD

DescriptionNVD

In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix potential deadlock in cpu hotplug with osnoise

The following sequence may leads deadlock in cpu hotplug:

task1 task2 task3 ----- ----- -----

mutex_lock(&interface_lock)

[CPU GOING OFFLINE]

cpus_write_lock(); osnoise_cpu_die(); kthread_stop(task3); wait_for_completion();

osnoise_sleep(); mutex_lock(&interface_lock);

cpus_read_lock();

[DEAD LOCK]

Fix by swap the order of cpus_read_lock() and mutex_lock(&interface_lock).

AnalysisAI

Denial of service via deadlock in the Linux kernel tracing subsystem occurs when CPU hotplug operations interact with osnoise tracing thread lifecycle management. A local privileged user can trigger a deadlock by inducing CPU offline events while osnoise threads hold conflicting locks (interface_lock and cpus_read_lock), causing system hang. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Share

EUVD-2026-24839 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy