CVE-2026-23217
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/02/2026
Last modified:
18/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
riscv: trace: fix snapshot deadlock with sbi ecall<br />
<br />
If sbi_ecall.c&#39;s functions are traceable,<br />
<br />
echo "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter<br />
<br />
may get the kernel into a deadlock.<br />
<br />
(Functions in sbi_ecall.c are excluded from tracing if<br />
CONFIG_RISCV_ALTERNATIVE_EARLY is set.)<br />
<br />
__sbi_ecall triggers a snapshot of the ringbuffer. The snapshot code<br />
raises an IPI interrupt, which results in another call to __sbi_ecall<br />
and another snapshot...<br />
<br />
All it takes to get into this endless loop is one initial __sbi_ecall.<br />
On RISC-V systems without SSTC extension, the clock events in<br />
timer-riscv.c issue periodic sbi ecalls, making the problem easy to<br />
trigger.<br />
<br />
Always exclude the sbi_ecall.c functions from tracing to fix the<br />
potential deadlock.<br />
<br />
sbi ecalls can easiliy be logged via trace events, excluding ecall<br />
functions from function tracing is not a big limitation.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10.10 (including) | 6.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11.1 (including) | 6.18.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



