Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23275— io_uring: ensure ctx->rings is stable for task work flags manipulation

CVSS 7.8 · High EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23275

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
io_uring: ensure ctx->rings is stable for task work flags manipulation
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: io_uring: ensure ctx->rings is stable for task work flags manipulation If DEFER_TASKRUN | SETUP_TASKRUN is used and task work is added while the ring is being resized, it's possible for the OR'ing of IORING_SQ_TASKRUN to happen in the small window of swapping into the new rings and the old rings being freed. Prevent this by adding a 2nd ->rings pointer, ->rings_rcu, which is protected by RCU. The task work flags manipulation is inside RCU already, and if the resize ring freeing is done post an RCU synchronize, then there's no need to add locking to the fast path of task work additions. Note: this is only done for DEFER_TASKRUN, as that's the only setup mode that supports ring resizing. If this ever changes, then they too need to use the io_ctx_mark_taskrun() helper.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于io_uring在任务工作标志操作期间ctx->rings指针不稳定,可能导致任务工作标志操作访问已释放内存。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 79cfe9e59c2a12c3b3faeeefe38d23f3d8030972 ~ 7cc4530b3e952d4a5947e1e55d06620d8845d4f5 -
LinuxLinux 6.13 -

II. Public POCs for CVE-2026-23275

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23275

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-03-20 · 8 CVEs total

CVE-2026-232787.8 HIGHnetfilter: nf_tables: always walk all pending catchall elements
CVE-2026-232747.8 HIGHnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
CVE-2026-232737.8 HIGHmacvlan: observe an RCU grace period in macvlan_common_newlink() error path
CVE-2026-232727.8 HIGHnetfilter: nf_tables: unconditionally bump set->nelems before insertion
CVE-2026-232717.8 HIGHperf: Fix __perf_event_overflow() vs perf_remove_from_context() race
CVE-2026-23276net: add xmit recursion limit to tunnel xmit functions
CVE-2026-23277net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit

IV. Related Vulnerabilities

V. Comments for CVE-2026-23275

No comments yet


Leave a comment