hwmon: (pmbus/core) Protect regulator operations with mutex
Summary
| CVE | CVE-2026-31486 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:46 UTC |
| Updated | 2026-04-22 14:16:46 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
hwmon: (pmbus/core) Protect regulator operations with mutex
The regulator operations pmbus_regulator_get_voltage(),
pmbus_regulator_set_voltage(), and pmbus_regulator_list_voltage()
access PMBus registers and shared data but were not protected by
the update_lock mutex. This could lead to race conditions.
However, adding mutex protection directly to these functions causes
a deadlock because pmbus_regulator_notify() (which calls
regulator_notifier_call_chain()) is often called with the mutex
already held (e.g., from pmbus_fault_handler()). If a regulator
callback then calls one of the now-protected voltage functions,
it will attempt to acquire the same mutex.
Rework pmbus_regulator_notify() to utilize a worker function to
send notifications outside of the mutex protection. Events are
stored as atomics in a per-page bitmask and processed by the worker.
Initialize the worker and its associated data during regulator
registration, and ensure it is cancelled on device removal using
devm_add_action_or_reset().
While at it, remove the unnecessary include of linux/of.h. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected ddbb4db4ced1ba784fcd3500179a7291b6c5d7b7 4e9d723d9f198b86f6882a84c501ba1f39e8d055 git |
Not specified |
| CNA |
Linux |
Linux |
affected ddbb4db4ced1ba784fcd3500179a7291b6c5d7b7 2c77ae315f3ce9d2c8e1609be74c9358c1fe4e07 git |
Not specified |
| CNA |
Linux |
Linux |
affected ddbb4db4ced1ba784fcd3500179a7291b6c5d7b7 754bd2b4a084b90b5e7b630e1f423061a9b9b761 git |
Not specified |
| CNA |
Linux |
Linux |
affected 3.19 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 3.19 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/754bd2b4a084b90b5e7b630e1f423061a9b9b761 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/2c77ae315f3ce9d2c8e1609be74c9358c1fe4e07 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/4e9d723d9f198b86f6882a84c501ba1f39e8d055 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.