CVE-2026-23106

Source
https://cve.org/CVERecord?id=CVE-2026-23106
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23106.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23106
Downstream
Published
2026-02-04T16:08:27.046Z
Modified
2026-02-05T00:45:40.487Z
Summary
timekeeping: Adjust the leap state for the correct auxiliary timekeeper
Details

In the Linux kernel, the following vulnerability has been resolved:

timekeeping: Adjust the leap state for the correct auxiliary timekeeper

When _doajdtimex() was introduced to handle adjtimex for any timekeeper, this reference to tk_core was not updated. When called on an auxiliary timekeeper, the core timekeeper would be updated incorrectly.

This gets caught by the lock debugging diagnostics because the timekeepers sequence lock gets written to without holding its associated spinlock:

WARNING: include/linux/seqlock.h:226 at _doadjtimex+0x394/0x3b0, CPU#2: test/125 auxclockadj (kernel/time/timekeeping.c:2979) _dosysclockadjtime (kernel/time/posix-timers.c:1161 kernel/time/posix-timers.c:1173) dosyscall64 (arch/x86/entry/syscall64.c:63 (discriminator 1) arch/x86/entry/syscall64.c:94 (discriminator 1)) entrySYSCALL64afterhwframe (arch/x86/entry/entry_64.S:131)

Update the correct auxiliary timekeeper.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23106.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
775f71ebedd382da390dc16a4c28cffa5b937f79
Fixed
8f7c9dbeaa0be5810e44d323735967d3dba9239d
Fixed
e806f7dde8ba28bc72a7a0898589cac79f6362ac

Affected versions

v6.*
v6.16
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.18
v6.18-rc1
v6.18-rc2
v6.18-rc3
v6.18-rc4
v6.18-rc5
v6.18-rc6
v6.18-rc7
v6.18.1
v6.18.2
v6.18.3
v6.18.4
v6.18.5
v6.18.6
v6.18.7
v6.19-rc1
v6.19-rc2
v6.19-rc3
v6.19-rc4
v6.19-rc5
v6.19-rc6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23106.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.17.0
Fixed
6.18.8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23106.json"