CVE-2026-23393

Source
https://cve.org/CVERecord?id=CVE-2026-23393
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23393.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23393
Downstream
Published
2026-03-25T10:33:17.407Z
Modified
2026-04-02T13:12:23.648708Z
Summary
bridge: cfm: Fix race condition in peer_mep deletion
Details

In the Linux kernel, the following vulnerability has been resolved:

bridge: cfm: Fix race condition in peer_mep deletion

When a peer MEP is being deleted, canceldelayedworksync() is called on ccmrxdwork before freeing. However, brcfmframerx() runs in softirq context under rcureadlock (without RTNL) and can re-schedule ccmrxdwork via ccmrxtimerstart() between canceldelayedworksync() returning and kfree_rcu() being called.

The following is a simple race scenario:

       cpu0                                     cpu1

mepdeleteimplementation() canceldelayedworksync(ccmrxdwork); brcfmframerx() // peermep still in hlist if (peermep->ccmdefect) ccmrxtimerstart() queuedelayedwork(ccmrxdwork) hlistdelrcu(&peermep->head); kfreercu(peermep, rcu); ccmrxworkexpired() // on freed peer_mep

To prevent this, canceldelayedworksync() is replaced with disabledelayedworksync() in both peer MEP deletion paths, so that subsequent queuedelayedwork() calls from brcfmframe_rx() are silently rejected.

The ccpeerdisable() helper retains canceldelayedwork_sync() because it is also used for the CC enable/disable toggle path where the work must remain re-schedulable.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23393.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dc32cbb3dbd7da38c700d6e0fc6354df24920525
Fixed
e89dbd2736a45f0507949af4748cbbf3ff793146
Fixed
d8f35767bacb3c7769d470a41cf161e3f3c07e70
Fixed
1fd81151f65927fd9edb8ecd12ad45527dbbe5ab
Fixed
3715a00855316066cdda69d43648336367422127

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23393.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
6.12.78
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.20
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23393.json"