{"api_version":"1","generated_at":"2026-04-24T20:54:54+00:00","cve":"CVE-2026-23369","urls":{"html":"https://cve.report/CVE-2026-23369","api":"https://cve.report/api/cve/CVE-2026-23369.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-23369","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-23369"},"summary":{"title":"i2c: i801: Revert \"i2c: i801: replace acpi_lock with I2C bus lock\"","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Revert \"i2c: i801: replace acpi_lock with I2C bus lock\"\n\nThis reverts commit f707d6b9e7c18f669adfdb443906d46cfbaaa0c1.\n\nUnder rare circumstances, multiple udev threads can collect i801 device\ninfo on boot and walk i801_acpi_io_handler somewhat concurrently. The\nfirst will note the area is reserved by acpi to prevent further touches.\nThis ultimately causes the area to be deregistered. The second will\nenter i801_acpi_io_handler after the area is unregistered but before a\ncheck can be made that the area is unregistered. i2c_lock_bus relies on\nthe now unregistered area containing lock_ops to lock the bus. The end\nresult is a kernel panic on boot with the following backtrace;\n\n[   14.971872] ioatdma 0000:09:00.2: enabling device (0100 -> 0102)\n[   14.971873] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[   14.971880] #PF: supervisor read access in kernel mode\n[   14.971884] #PF: error_code(0x0000) - not-present page\n[   14.971887] PGD 0 P4D 0\n[   14.971894] Oops: 0000 [#1] PREEMPT SMP PTI\n[   14.971900] CPU: 5 PID: 956 Comm: systemd-udevd Not tainted 5.14.0-611.5.1.el9_7.x86_64 #1\n[   14.971905] Hardware name: XXXXXXXXXXXXXXXXXXXXXXX BIOS 1.20.10.SV91 01/30/2023\n[   14.971908] RIP: 0010:i801_acpi_io_handler+0x2d/0xb0 [i2c_i801]\n[   14.971929] Code: 00 00 49 8b 40 20 41 57 41 56 4d 8b b8 30 04 00 00 49 89 ce 41 55 41 89 d5 41 54 49 89 f4 be 02 00 00 00 55 4c 89 c5 53 89 fb <48> 8b 00 4c 89 c7 e8 18 61 54 e9 80 bd 80 04 00 00 00 75 09 4c 3b\n[   14.971933] RSP: 0018:ffffbaa841483838 EFLAGS: 00010282\n[   14.971938] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9685e01ba568\n[   14.971941] RDX: 0000000000000008 RSI: 0000000000000002 RDI: 0000000000000000\n[   14.971944] RBP: ffff9685ca22f028 R08: ffff9685ca22f028 R09: ffff9685ca22f028\n[   14.971948] R10: 000000000000000b R11: 0000000000000580 R12: 0000000000000580\n[   14.971951] R13: 0000000000000008 R14: ffff9685e01ba568 R15: ffff9685c222f000\n[   14.971954] FS:  00007f8287c0ab40(0000) GS:ffff96a47f940000(0000) knlGS:0000000000000000\n[   14.971959] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   14.971963] CR2: 0000000000000000 CR3: 0000000168090001 CR4: 00000000003706f0\n[   14.971966] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   14.971968] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   14.971972] Call Trace:\n[   14.971977]  <TASK>\n[   14.971981]  ? show_trace_log_lvl+0x1c4/0x2df\n[   14.971994]  ? show_trace_log_lvl+0x1c4/0x2df\n[   14.972003]  ? acpi_ev_address_space_dispatch+0x16e/0x3c0\n[   14.972014]  ? __die_body.cold+0x8/0xd\n[   14.972021]  ? page_fault_oops+0x132/0x170\n[   14.972028]  ? exc_page_fault+0x61/0x150\n[   14.972036]  ? asm_exc_page_fault+0x22/0x30\n[   14.972045]  ? i801_acpi_io_handler+0x2d/0xb0 [i2c_i801]\n[   14.972061]  acpi_ev_address_space_dispatch+0x16e/0x3c0\n[   14.972069]  ? __pfx_i801_acpi_io_handler+0x10/0x10 [i2c_i801]\n[   14.972085]  acpi_ex_access_region+0x5b/0xd0\n[   14.972093]  acpi_ex_field_datum_io+0x73/0x2e0\n[   14.972100]  acpi_ex_read_data_from_field+0x8e/0x230\n[   14.972106]  acpi_ex_resolve_node_to_value+0x23d/0x310\n[   14.972114]  acpi_ds_evaluate_name_path+0xad/0x110\n[   14.972121]  acpi_ds_exec_end_op+0x321/0x510\n[   14.972127]  acpi_ps_parse_loop+0xf7/0x680\n[   14.972136]  acpi_ps_parse_aml+0x17a/0x3d0\n[   14.972143]  acpi_ps_execute_method+0x137/0x270\n[   14.972150]  acpi_ns_evaluate+0x1f4/0x2e0\n[   14.972158]  acpi_evaluate_object+0x134/0x2f0\n[   14.972164]  acpi_evaluate_integer+0x50/0xe0\n[   14.972173]  ? vsnprintf+0x24b/0x570\n[   14.972181]  acpi_ac_get_state.part.0+0x23/0x70\n[   14.972189]  get_ac_property+0x4e/0x60\n[   14.972195]  power_supply_show_property+0x90/0x1f0\n[   14.972205]  add_prop_uevent+0x29/0x90\n[   14.972213]  power_supply_uevent+0x109/0x1d0\n[   14.972222]  dev_uevent+0x10e/0x2f0\n[   14.972228]  uevent_show+0x8e/0x100\n[   14.972236]  dev_attr_show+0x19\n---truncated---","state":"PUBLISHED","assigner":"Linux","published_at":"2026-03-25 11:16:36","updated_at":"2026-04-24 16:38:18"},"problem_types":["CWE-476"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"5.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://git.kernel.org/stable/c/1c72e7b0b442ce21a1348d9b8237cfddb67048eb","name":"https://git.kernel.org/stable/c/1c72e7b0b442ce21a1348d9b8237cfddb67048eb","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/9507f9953a2a5647eb42668d0c243fdbd7e72954","name":"https://git.kernel.org/stable/c/9507f9953a2a5647eb42668d0c243fdbd7e72954","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/cfc69c2e6c699c96949f7b0455195b0bfb7dc715","name":"https://git.kernel.org/stable/c/cfc69c2e6c699c96949f7b0455195b0bfb7dc715","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c726273044a5a8308a889d19d6884135c0f3321d","name":"https://git.kernel.org/stable/c/c726273044a5a8308a889d19d6884135c0f3321d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23369","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23369","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f707d6b9e7c18f669adfdb443906d46cfbaaa0c1 9507f9953a2a5647eb42668d0c243fdbd7e72954 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f707d6b9e7c18f669adfdb443906d46cfbaaa0c1 1c72e7b0b442ce21a1348d9b8237cfddb67048eb git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f707d6b9e7c18f669adfdb443906d46cfbaaa0c1 c726273044a5a8308a889d19d6884135c0f3321d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f707d6b9e7c18f669adfdb443906d46cfbaaa0c1 cfc69c2e6c699c96949f7b0455195b0bfb7dc715 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.7","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.7 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.77 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.17 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.7 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"23369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/i2c/busses/i2c-i801.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"9507f9953a2a5647eb42668d0c243fdbd7e72954","status":"affected","version":"f707d6b9e7c18f669adfdb443906d46cfbaaa0c1","versionType":"git"},{"lessThan":"1c72e7b0b442ce21a1348d9b8237cfddb67048eb","status":"affected","version":"f707d6b9e7c18f669adfdb443906d46cfbaaa0c1","versionType":"git"},{"lessThan":"c726273044a5a8308a889d19d6884135c0f3321d","status":"affected","version":"f707d6b9e7c18f669adfdb443906d46cfbaaa0c1","versionType":"git"},{"lessThan":"cfc69c2e6c699c96949f7b0455195b0bfb7dc715","status":"affected","version":"f707d6b9e7c18f669adfdb443906d46cfbaaa0c1","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/i2c/busses/i2c-i801.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.7"},{"lessThan":"6.7","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.77","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.17","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.7","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.77","versionStartIncluding":"6.7","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.17","versionStartIncluding":"6.7","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.7","versionStartIncluding":"6.7","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.7","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Revert \"i2c: i801: replace acpi_lock with I2C bus lock\"\n\nThis reverts commit f707d6b9e7c18f669adfdb443906d46cfbaaa0c1.\n\nUnder rare circumstances, multiple udev threads can collect i801 device\ninfo on boot and walk i801_acpi_io_handler somewhat concurrently. The\nfirst will note the area is reserved by acpi to prevent further touches.\nThis ultimately causes the area to be deregistered. The second will\nenter i801_acpi_io_handler after the area is unregistered but before a\ncheck can be made that the area is unregistered. i2c_lock_bus relies on\nthe now unregistered area containing lock_ops to lock the bus. The end\nresult is a kernel panic on boot with the following backtrace;\n\n[   14.971872] ioatdma 0000:09:00.2: enabling device (0100 -> 0102)\n[   14.971873] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[   14.971880] #PF: supervisor read access in kernel mode\n[   14.971884] #PF: error_code(0x0000) - not-present page\n[   14.971887] PGD 0 P4D 0\n[   14.971894] Oops: 0000 [#1] PREEMPT SMP PTI\n[   14.971900] CPU: 5 PID: 956 Comm: systemd-udevd Not tainted 5.14.0-611.5.1.el9_7.x86_64 #1\n[   14.971905] Hardware name: XXXXXXXXXXXXXXXXXXXXXXX BIOS 1.20.10.SV91 01/30/2023\n[   14.971908] RIP: 0010:i801_acpi_io_handler+0x2d/0xb0 [i2c_i801]\n[   14.971929] Code: 00 00 49 8b 40 20 41 57 41 56 4d 8b b8 30 04 00 00 49 89 ce 41 55 41 89 d5 41 54 49 89 f4 be 02 00 00 00 55 4c 89 c5 53 89 fb <48> 8b 00 4c 89 c7 e8 18 61 54 e9 80 bd 80 04 00 00 00 75 09 4c 3b\n[   14.971933] RSP: 0018:ffffbaa841483838 EFLAGS: 00010282\n[   14.971938] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9685e01ba568\n[   14.971941] RDX: 0000000000000008 RSI: 0000000000000002 RDI: 0000000000000000\n[   14.971944] RBP: ffff9685ca22f028 R08: ffff9685ca22f028 R09: ffff9685ca22f028\n[   14.971948] R10: 000000000000000b R11: 0000000000000580 R12: 0000000000000580\n[   14.971951] R13: 0000000000000008 R14: ffff9685e01ba568 R15: ffff9685c222f000\n[   14.971954] FS:  00007f8287c0ab40(0000) GS:ffff96a47f940000(0000) knlGS:0000000000000000\n[   14.971959] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   14.971963] CR2: 0000000000000000 CR3: 0000000168090001 CR4: 00000000003706f0\n[   14.971966] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   14.971968] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   14.971972] Call Trace:\n[   14.971977]  <TASK>\n[   14.971981]  ? show_trace_log_lvl+0x1c4/0x2df\n[   14.971994]  ? show_trace_log_lvl+0x1c4/0x2df\n[   14.972003]  ? acpi_ev_address_space_dispatch+0x16e/0x3c0\n[   14.972014]  ? __die_body.cold+0x8/0xd\n[   14.972021]  ? page_fault_oops+0x132/0x170\n[   14.972028]  ? exc_page_fault+0x61/0x150\n[   14.972036]  ? asm_exc_page_fault+0x22/0x30\n[   14.972045]  ? i801_acpi_io_handler+0x2d/0xb0 [i2c_i801]\n[   14.972061]  acpi_ev_address_space_dispatch+0x16e/0x3c0\n[   14.972069]  ? __pfx_i801_acpi_io_handler+0x10/0x10 [i2c_i801]\n[   14.972085]  acpi_ex_access_region+0x5b/0xd0\n[   14.972093]  acpi_ex_field_datum_io+0x73/0x2e0\n[   14.972100]  acpi_ex_read_data_from_field+0x8e/0x230\n[   14.972106]  acpi_ex_resolve_node_to_value+0x23d/0x310\n[   14.972114]  acpi_ds_evaluate_name_path+0xad/0x110\n[   14.972121]  acpi_ds_exec_end_op+0x321/0x510\n[   14.972127]  acpi_ps_parse_loop+0xf7/0x680\n[   14.972136]  acpi_ps_parse_aml+0x17a/0x3d0\n[   14.972143]  acpi_ps_execute_method+0x137/0x270\n[   14.972150]  acpi_ns_evaluate+0x1f4/0x2e0\n[   14.972158]  acpi_evaluate_object+0x134/0x2f0\n[   14.972164]  acpi_evaluate_integer+0x50/0xe0\n[   14.972173]  ? vsnprintf+0x24b/0x570\n[   14.972181]  acpi_ac_get_state.part.0+0x23/0x70\n[   14.972189]  get_ac_property+0x4e/0x60\n[   14.972195]  power_supply_show_property+0x90/0x1f0\n[   14.972205]  add_prop_uevent+0x29/0x90\n[   14.972213]  power_supply_uevent+0x109/0x1d0\n[   14.972222]  dev_uevent+0x10e/0x2f0\n[   14.972228]  uevent_show+0x8e/0x100\n[   14.972236]  dev_attr_show+0x19\n---truncated---"}],"providerMetadata":{"dateUpdated":"2026-04-13T06:05:58.696Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/9507f9953a2a5647eb42668d0c243fdbd7e72954"},{"url":"https://git.kernel.org/stable/c/1c72e7b0b442ce21a1348d9b8237cfddb67048eb"},{"url":"https://git.kernel.org/stable/c/c726273044a5a8308a889d19d6884135c0f3321d"},{"url":"https://git.kernel.org/stable/c/cfc69c2e6c699c96949f7b0455195b0bfb7dc715"}],"title":"i2c: i801: Revert \"i2c: i801: replace acpi_lock with I2C bus lock\"","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-23369","datePublished":"2026-03-25T10:27:50.705Z","dateReserved":"2026-01-13T15:37:46.003Z","dateUpdated":"2026-04-13T06:05:58.696Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-25 11:16:36","lastModifiedDate":"2026-04-24 16:38:18","problem_types":["CWE-476"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.1","versionEndExcluding":"6.12.77","matchCriteriaId":"EAB42ADC-2196-46FA-AAE7-AE91B7577E53"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.18.17","matchCriteriaId":"A5E006E4-59C7-43C1-9231-62A72219F2BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.19","versionEndExcluding":"6.19.7","matchCriteriaId":"69245D10-0B71-485E-80C3-A64F077004D3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*","matchCriteriaId":"62B55B1B-7D3E-499B-9C42-E9F1EF05A54A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*","matchCriteriaId":"F253B622-8837-4245-BCE5-A7BF8FC76A16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*","matchCriteriaId":"4AE85AD8-4641-4E7C-A2F4-305E2CD9EE64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*","matchCriteriaId":"F666C8D8-6538-46D4-B318-87610DE64C34"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*","matchCriteriaId":"02259FDA-961B-47BC-AE7F-93D7EC6E90C2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*","matchCriteriaId":"58A9FEFF-C040-420D-8F0A-BFDAAA1DF258"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*","matchCriteriaId":"1D2315C0-D46F-4F85-9754-F9E5E11374A6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*","matchCriteriaId":"512EE3A8-A590-4501-9A94-5D4B268D6138"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"23369","Ordinal":"1","Title":"i2c: i801: Revert \"i2c: i801: replace acpi_lock with I2C bus loc","CVE":"CVE-2026-23369","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"23369","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Revert \"i2c: i801: replace acpi_lock with I2C bus lock\"\n\nThis reverts commit f707d6b9e7c18f669adfdb443906d46cfbaaa0c1.\n\nUnder rare circumstances, multiple udev threads can collect i801 device\ninfo on boot and walk i801_acpi_io_handler somewhat concurrently. The\nfirst will note the area is reserved by acpi to prevent further touches.\nThis ultimately causes the area to be deregistered. The second will\nenter i801_acpi_io_handler after the area is unregistered but before a\ncheck can be made that the area is unregistered. i2c_lock_bus relies on\nthe now unregistered area containing lock_ops to lock the bus. The end\nresult is a kernel panic on boot with the following backtrace;\n\n[   14.971872] ioatdma 0000:09:00.2: enabling device (0100 -> 0102)\n[   14.971873] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[   14.971880] #PF: supervisor read access in kernel mode\n[   14.971884] #PF: error_code(0x0000) - not-present page\n[   14.971887] PGD 0 P4D 0\n[   14.971894] Oops: 0000 [#1] PREEMPT SMP PTI\n[   14.971900] CPU: 5 PID: 956 Comm: systemd-udevd Not tainted 5.14.0-611.5.1.el9_7.x86_64 #1\n[   14.971905] Hardware name: XXXXXXXXXXXXXXXXXXXXXXX BIOS 1.20.10.SV91 01/30/2023\n[   14.971908] RIP: 0010:i801_acpi_io_handler+0x2d/0xb0 [i2c_i801]\n[   14.971929] Code: 00 00 49 8b 40 20 41 57 41 56 4d 8b b8 30 04 00 00 49 89 ce 41 55 41 89 d5 41 54 49 89 f4 be 02 00 00 00 55 4c 89 c5 53 89 fb <48> 8b 00 4c 89 c7 e8 18 61 54 e9 80 bd 80 04 00 00 00 75 09 4c 3b\n[   14.971933] RSP: 0018:ffffbaa841483838 EFLAGS: 00010282\n[   14.971938] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9685e01ba568\n[   14.971941] RDX: 0000000000000008 RSI: 0000000000000002 RDI: 0000000000000000\n[   14.971944] RBP: ffff9685ca22f028 R08: ffff9685ca22f028 R09: ffff9685ca22f028\n[   14.971948] R10: 000000000000000b R11: 0000000000000580 R12: 0000000000000580\n[   14.971951] R13: 0000000000000008 R14: ffff9685e01ba568 R15: ffff9685c222f000\n[   14.971954] FS:  00007f8287c0ab40(0000) GS:ffff96a47f940000(0000) knlGS:0000000000000000\n[   14.971959] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   14.971963] CR2: 0000000000000000 CR3: 0000000168090001 CR4: 00000000003706f0\n[   14.971966] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   14.971968] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   14.971972] Call Trace:\n[   14.971977]  <TASK>\n[   14.971981]  ? show_trace_log_lvl+0x1c4/0x2df\n[   14.971994]  ? show_trace_log_lvl+0x1c4/0x2df\n[   14.972003]  ? acpi_ev_address_space_dispatch+0x16e/0x3c0\n[   14.972014]  ? __die_body.cold+0x8/0xd\n[   14.972021]  ? page_fault_oops+0x132/0x170\n[   14.972028]  ? exc_page_fault+0x61/0x150\n[   14.972036]  ? asm_exc_page_fault+0x22/0x30\n[   14.972045]  ? i801_acpi_io_handler+0x2d/0xb0 [i2c_i801]\n[   14.972061]  acpi_ev_address_space_dispatch+0x16e/0x3c0\n[   14.972069]  ? __pfx_i801_acpi_io_handler+0x10/0x10 [i2c_i801]\n[   14.972085]  acpi_ex_access_region+0x5b/0xd0\n[   14.972093]  acpi_ex_field_datum_io+0x73/0x2e0\n[   14.972100]  acpi_ex_read_data_from_field+0x8e/0x230\n[   14.972106]  acpi_ex_resolve_node_to_value+0x23d/0x310\n[   14.972114]  acpi_ds_evaluate_name_path+0xad/0x110\n[   14.972121]  acpi_ds_exec_end_op+0x321/0x510\n[   14.972127]  acpi_ps_parse_loop+0xf7/0x680\n[   14.972136]  acpi_ps_parse_aml+0x17a/0x3d0\n[   14.972143]  acpi_ps_execute_method+0x137/0x270\n[   14.972150]  acpi_ns_evaluate+0x1f4/0x2e0\n[   14.972158]  acpi_evaluate_object+0x134/0x2f0\n[   14.972164]  acpi_evaluate_integer+0x50/0xe0\n[   14.972173]  ? vsnprintf+0x24b/0x570\n[   14.972181]  acpi_ac_get_state.part.0+0x23/0x70\n[   14.972189]  get_ac_property+0x4e/0x60\n[   14.972195]  power_supply_show_property+0x90/0x1f0\n[   14.972205]  add_prop_uevent+0x29/0x90\n[   14.972213]  power_supply_uevent+0x109/0x1d0\n[   14.972222]  dev_uevent+0x10e/0x2f0\n[   14.972228]  uevent_show+0x8e/0x100\n[   14.972236]  dev_attr_show+0x19\n---truncated---","Type":"Description","Title":"i2c: i801: Revert \"i2c: i801: replace acpi_lock with I2C bus loc"}]}}}