CVE-2026-23253
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-core: fix wrong reinitialization of ringbuffer on reopen
dvb_dvr_open() calls dvb_ringbuffer_init() when a new reader opens the
DVR device. dvb_ringbuffer_init() calls init_waitqueue_head(), which
reinitializes the waitqueue list head to empty.
Since dmxdev->dvr_buffer.queue is a shared waitqueue (all opens of the
same DVR device share it), this orphans any existing waitqueue entries
from io_uring poll or epoll, leaving them with stale prev/next pointers
while the list head is reset to {self, self}.
The waitqueue and spinlock in dvr_buffer are already properly
initialized once in dvb_dmxdev_init(). The open path only needs to
reset the buffer data pointer, size, and read/write positions.
Replace the dvb_ringbuffer_init() call in dvb_dvr_open() with direct
assignment of data/size and a call to dvb_ringbuffer_reset(), which
properly resets pread, pwrite, and error with correct memory ordering
without touching the waitqueue or spinlock.
https://nvd.nist.gov/vuln/detail/CVE-2026-23253
Categories
No category defined
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67
AFFECTED (from MITRE)
| Vendor |
Product |
Versions |
| Linux |
Linux |
- 34731df288a5ffe4b0c396caf8cd24c6a710a222 < d71781bad59b1c9d60d7068004581f9bf19c0c9d [affected]
- 34731df288a5ffe4b0c396caf8cd24c6a710a222 < cfd94642025e6f71c8f754bdec0800ee95e4f3dd [affected]
- 34731df288a5ffe4b0c396caf8cd24c6a710a222 < 32eb8e4adc207ef31bc6e5ae56bab940b0176066 [affected]
- 34731df288a5ffe4b0c396caf8cd24c6a710a222 < bfbc0b5b32a8f28ce284add619bf226716a59bc0 [affected]
|
| Linux |
Linux |
- 2.6.17 [affected]
- < 2.6.17 [unaffected]
- 6.12.77 ≤ 6.12.* [unaffected]
- 6.18.17 ≤ 6.18.* [unaffected]
- 6.19.7 ≤ 6.19.* [unaffected]
- 7.0-rc2 ≤ * [unaffected]
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
CPE
| cpe |
start |
end |
| Configuration 1 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 2.6.17 |
< 6.12.77 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 2.6.17 |
< 6.18.17 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 2.6.17 |
< 6.19.7 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 2.6.17 |
< 7.0-rc2 |
REMEDIATION
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer