{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23229","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-01-13T15:37:45.988Z","datePublished":"2026-02-18T14:53:33.015Z","dateUpdated":"2026-05-11T22:02:49.242Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:02:49.242Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n  openssl speed -evp aes-128-cbc -engine afalg  -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/crypto/virtio/virtio_crypto_core.c"],"versions":[{"version":"0eb69890e86775d178452880ea0d24384c5ccedf","lessThan":"552475d0b6cece73a52c0fa5faa0ce45e99df74b","status":"affected","versionType":"git"},{"version":"75cba72ddb788a5b9c7ed2139fbb84383df029eb","lessThan":"8ee8ccfd60bf17cbdab91069d324b5302f4f3a30","status":"affected","versionType":"git"},{"version":"ae4747dab2eab95a68bb2f6c7e904bff0424e1b1","lessThan":"c9e594194795c86ca753ad6ed64c2762e9309d0d","status":"affected","versionType":"git"},{"version":"c4c54fce9ec54a59a4ca035af13c2823c76684cc","lessThan":"d6f0d586808689963e58fd739bed626ff5013b24","status":"affected","versionType":"git"},{"version":"fed93fb62e05c38152b0fc1dc9609639e63eed76","lessThan":"c0a0ded3bb7fd45f720faa48449a930153257d3a","status":"affected","versionType":"git"},{"version":"fed93fb62e05c38152b0fc1dc9609639e63eed76","lessThan":"e69a7b0a71b6561b3b6459f1fded8d589f2e8ac2","status":"affected","versionType":"git"},{"version":"fed93fb62e05c38152b0fc1dc9609639e63eed76","lessThan":"49c57c6c108931a914ed94e3c0ddb974008260a3","status":"affected","versionType":"git"},{"version":"fed93fb62e05c38152b0fc1dc9609639e63eed76","lessThan":"b505047ffc8057555900d2d3a005d033e6967382","status":"affected","versionType":"git"},{"version":"96be18c8fff9d57e29621386e2fa17268383ea27","status":"affected","versionType":"git"},{"version":"830a4f073f7edd2cc4f30ba95bdc3495d97c2550","status":"affected","versionType":"git"},{"version":"8862c0d2e47ba1733d9687fe0ff4e02d6e391255","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/crypto/virtio/virtio_crypto_core.c"],"versions":[{"version":"6.8","status":"affected"},{"version":"0","lessThan":"6.8","status":"unaffected","versionType":"semver"},{"version":"5.10.251","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.201","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.164","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.125","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.72","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.11","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.1","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.209","versionEndExcluding":"5.10.251"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.148","versionEndExcluding":"5.15.201"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.75","versionEndExcluding":"6.1.164"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.14","versionEndExcluding":"6.6.125"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.12.72"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.18.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.19.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"7.0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.306"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.268"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/552475d0b6cece73a52c0fa5faa0ce45e99df74b"},{"url":"https://git.kernel.org/stable/c/8ee8ccfd60bf17cbdab91069d324b5302f4f3a30"},{"url":"https://git.kernel.org/stable/c/c9e594194795c86ca753ad6ed64c2762e9309d0d"},{"url":"https://git.kernel.org/stable/c/d6f0d586808689963e58fd739bed626ff5013b24"},{"url":"https://git.kernel.org/stable/c/c0a0ded3bb7fd45f720faa48449a930153257d3a"},{"url":"https://git.kernel.org/stable/c/e69a7b0a71b6561b3b6459f1fded8d589f2e8ac2"},{"url":"https://git.kernel.org/stable/c/49c57c6c108931a914ed94e3c0ddb974008260a3"},{"url":"https://git.kernel.org/stable/c/b505047ffc8057555900d2d3a005d033e6967382"}],"title":"crypto: virtio - Add spinlock protection with virtqueue notification","x_generator":{"engine":"bippy-1.2.0"}}}}