CVE-2026-43227
lowCVSS v3 Base Score
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
None
Integrity
None
Availability
High
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in the Linux kernel's `clocksource/drivers/sh_tmu` component. This issue arises when the `sh_tmu` driver attempts to manage its power and clock states using specific runtime power management functions while holding raw spinlocks. This creates a conflict with other platform drivers that use regular spinlocks for power and clock control, particularly in real-time (PREEMPT_RT) kernel configurations. This concurrency issue can lead to an 'Invalid wait context' error, potentially causing system instability or a denial of service.
CWE
CWE-821Affected Products
Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9