The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31740

CVE-2026-31740: Linux Kernel Race Condition Vulnerability

CVE-2026-31740 is a race condition vulnerability in the Linux Kernel's counter driver affecting runtime PM operations. This article covers the technical details, affected versions, security impact, and mitigation steps.

Published: May 7, 2026

CVE-2026-31740 Overview

CVE-2026-31740 is a race condition vulnerability in the Linux kernel rz-mtu3-cnt counter driver. The flaw arises because the counter and PWM sub-drivers both write to the shared dev member of struct rz_mtu3_channel for hardware channels 1 and 2. Each sub-driver overwrites the other's struct device pointer, leaving the counter sub-driver to perform runtime power management actions on the wrong device depending on probe order. The issue affects Linux kernel versions through 7.0-rc6 on systems using the Renesas RZ MTU3 hardware. Successful exploitation requires local access with low privileges and impacts system availability.

Critical Impact

A local authenticated attacker can trigger incorrect runtime power management on a mismatched device, leading to kernel-level denial of service on affected Renesas RZ platforms.

Affected Products

  • Linux Kernel (multiple stable branches)
  • Linux Kernel 7.0-rc1 through 7.0-rc6
  • Systems using the Renesas RZ MTU3 counter and PWM drivers

Discovery Timeline

  • 2026-05-01 - CVE-2026-31740 published to NVD
  • 2026-05-07 - Last updated in NVD database

Technical Details for CVE-2026-31740

Vulnerability Analysis

The Linux kernel rz-mtu3-cnt counter driver shares hardware channel state with the rz-mtu3-pwm PWM driver through the struct rz_mtu3_channel structure. The counter driver uses hardware channels 1 and 2, while the PWM driver uses channels 0, 1, 2, 3, 4, 6, and 7. Both sub-drivers overlap on channels 1 and 2.

During probe, each sub-driver assigns its own struct device pointer to the shared dev member of struct rz_mtu3_channel. The second driver to probe overwrites the value set by the first. The counter sub-driver later dereferences this dev member to issue runtime power management calls.

When probe order causes the PWM driver to probe last, the counter driver invokes runtime PM operations against the PWM device instead of its own. This produces inconsistent power state transitions and can stall hardware activity tied to the counter subsystem.

Root Cause

The root cause is a shared mutable field in a structure used concurrently by two independent sub-drivers without coordinated ownership. Neither driver tracks whether the dev pointer already belongs to a peer driver, so the last writer wins. This is a design-level race condition between sub-driver probe paths rather than a classic concurrent-access TOCTOU.

Attack Vector

Exploitation requires local access with low privileges on a system running the affected drivers. An attacker with the ability to load, unload, or trigger probe of the rz-mtu3-cnt and rz-mtu3-pwm modules can influence probe ordering. By forcing the counter driver to use a stale or wrong struct device, runtime PM actions hit the wrong subsystem and can render the counter device unresponsive. Confidentiality and integrity are not affected; the impact is limited to availability of the affected hardware path.

The upstream fix replaces the use of the shared dev member with the parent device pointer of the counter, which is assigned correctly during probe and is not shared with the PWM driver.

Detection Methods for CVE-2026-31740

Indicators of Compromise

  • Unexpected runtime PM state transitions logged against the rz-mtu3-pwm device when only counter operations are active.
  • Kernel messages indicating counter device hangs or unresponsive MTU3 channels 1 or 2.
  • Module load order anomalies where rz-mtu3-pwm consistently probes after rz-mtu3-cnt on affected platforms.

Detection Strategies

  • Audit kernel logs (dmesg, journalctl -k) for runtime PM errors referencing rz-mtu3 devices.
  • Compare installed kernel version against the patched commits listed in the upstream stable trees.
  • Monitor for abnormal device probe sequences via udevadm monitor on Renesas RZ-based systems.

Monitoring Recommendations

  • Track kernel package versions across Linux fleets and flag hosts running unpatched stable branches.
  • Forward kernel logs to a centralized log platform and alert on rz-mtu3 runtime PM warnings.
  • Validate that embedded and industrial deployments using Renesas RZ silicon are inventoried and included in patch cycles.

How to Mitigate CVE-2026-31740

Immediate Actions Required

  • Identify Linux hosts using the rz-mtu3-cnt and rz-mtu3-pwm drivers, typically Renesas RZ-based embedded and industrial systems.
  • Apply the upstream stable kernel update containing the fix from the Linux kernel git tree.
  • Restrict local access and module-loading capability to trusted administrators where patching is delayed.

Patch Information

The vulnerability is resolved in upstream stable branches. Reference the fix commits: 28a371b, 2932095, 633dfbf, 63be324, and 6562290. The fix uses the counter's parent device pointer for runtime PM rather than the shared struct rz_mtu3_channeldev member.

Workarounds

  • Disable the rz-mtu3-cnt or rz-mtu3-pwm driver if the corresponding functionality is not required on the deployed system.
  • Constrain module loading via kernel module signing and modprobe configuration to prevent untrusted users from influencing probe order.
  • Limit CAP_SYS_MODULE to administrative accounts only.
bash
# Verify whether the affected drivers are loaded
lsmod | grep rz_mtu3

# Check current kernel version against patched stable releases
uname -r

# Optionally blacklist the counter module if unused
echo "blacklist rz_mtu3_cnt" | sudo tee /etc/modprobe.d/blacklist-rz-mtu3-cnt.conf
sudo update-initramfs -u

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Kernel Git Commit 28a371b

  • Kernel Git Commit 2932095

  • Kernel Git Commit 633dfbf

  • Kernel Git Commit 63be324

  • Kernel Git Commit 6562290
  • Related CVEs
  • CVE-2026-31751: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31726: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31700: Linux Kernel Race Condition Vulnerability

  • CVE-2026-43091: Linux Kernel Race Condition Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English