CVE-2026-31574
Description
In the Linux kernel, the following vulnerability has been resolved:
clockevents: Add missing resets of the next_event_forced flag
The prevention mechanism against timer interrupt starvation missed to reset the next_event_forced flag in a couple of places:
- When the clock event state changes. That can cause the flag to be stale over a shutdown/startup sequence
- When a non-forced event is armed, which then prevents rearming before that event. If that event is far out in the future this will cause missed timer interrupts.
- In the suspend wakeup handler.
That led to stalls which have been reported by several people.
Add the missing resets, which fixes the problems for the reporters.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing resets of the next_event_forced flag in the Linux kernel clockevents subsystem can cause timer interrupt stalls.
Vulnerability
The Linux kernel's clockevents subsystem implements a prevention mechanism against timer interrupt starvation. This mechanism relies on a next_event_forced flag to track forced events. However, the flag was not properly reset in several critical code paths: when the clock event state changes (e.g., during a shutdown/startup sequence), when a non-forced event is armed, and in the suspend wakeup handler [1][2]. This omission can leave the flag in a stale state.
Exploitation
The vulnerability can be triggered by normal system operations such as suspending and resuming, or by changing the state of clock event devices. No special privileges or authentication are needed beyond having access to the system; the issue manifests during routine kernel operations. For example, after a suspend/resume cycle, the stale flag may cause the kernel to skip the reprogramming of the next timer event.
Impact
An attacker (or an unprivileged user) could cause the system to miss timer interrupts, leading to system stalls or hangs. The reports from several users confirm that this bug results in observable system unresponsiveness. Because the bug affects the core timer subsystem, any service relying on timely interrupts (e.g., process scheduling, network timers) can be disrupted.
Mitigation
The fix involves adding the missing flag resets in the affected code paths. The patch has been committed to the Linux kernel stable branches and is available via commits 9401b593fa48 and 4096fd0e8eae [1][2]. Users are advised to update their kernel to a version that includes these commits. There is no known workaround other than applying the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.