CVE-2026-43227

low Red Hat
CVSS v3 Base Score
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
None
Integrity
None
Availability
High
Published: May 6, 2026 (8 days ago)
Last Modified: May 6, 2026
Vendor: Red Hat
Source: REDHAT

Description

A flaw was found in the Linux kernel's `clocksource/drivers/sh_tmu` component. This issue arises when the `sh_tmu` driver attempts to manage its power and clock states using specific runtime power management functions while holding raw spinlocks. This creates a conflict with other platform drivers that use regular spinlocks for power and clock control, particularly in real-time (PREEMPT_RT) kernel configurations. This concurrency issue can lead to an 'Invalid wait context' error, potentially causing system instability or a denial of service.

CWE

CWE-821

Affected Products

Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9

References