7.8
CVE-2026-23253
- EPSS 0.02%
- Veröffentlicht 18.03.2026 17:01:44
- Zuletzt bearbeitet 18.04.2026 09:16:15
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
media: dvb-core: fix wrong reinitialization of ringbuffer on reopen
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-core: fix wrong reinitialization of ringbuffer on reopen
dvb_dvr_open() calls dvb_ringbuffer_init() when a new reader opens the
DVR device. dvb_ringbuffer_init() calls init_waitqueue_head(), which
reinitializes the waitqueue list head to empty.
Since dmxdev->dvr_buffer.queue is a shared waitqueue (all opens of the
same DVR device share it), this orphans any existing waitqueue entries
from io_uring poll or epoll, leaving them with stale prev/next pointers
while the list head is reset to {self, self}.
The waitqueue and spinlock in dvr_buffer are already properly
initialized once in dvb_dmxdev_init(). The open path only needs to
reset the buffer data pointer, size, and read/write positions.
Replace the dvb_ringbuffer_init() call in dvb_dvr_open() with direct
assignment of data/size and a call to dvb_ringbuffer_reset(), which
properly resets pread, pwrite, and error with correct memory ordering
without touching the waitqueue or spinlock.Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
527cfa8a3486b3555c5c15e2f62be484a11398dc
Status
affected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
fb378cf89be434ed1f10ab79cc4788fba8ae868d
Status
affected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
f1e520ca2e83ece6731af6167c9e5e16931ecba0
Status
affected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
af050ab44fa1b1897a940d7d756e512232f5e5df
Status
affected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
d71781bad59b1c9d60d7068004581f9bf19c0c9d
Status
affected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
cfd94642025e6f71c8f754bdec0800ee95e4f3dd
Status
affected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
32eb8e4adc207ef31bc6e5ae56bab940b0176066
Status
affected
Version
34731df288a5ffe4b0c396caf8cd24c6a710a222
Version <
bfbc0b5b32a8f28ce284add619bf226716a59bc0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.17
Status
affected
Version
0
Version <
2.6.17
Status
unaffected
Version <=
5.10.*
Version
5.10.253
Status
unaffected
Version <=
5.15.*
Version
5.15.203
Status
unaffected
Version <=
6.1.*
Version
6.1.167
Status
unaffected
Version <=
6.6.*
Version
6.6.130
Status
unaffected
Version <=
6.12.*
Version
6.12.77
Status
unaffected
Version <=
6.18.*
Version
6.18.17
Status
unaffected
Version <=
6.19.*
Version
6.19.7
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.034 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|