HomeDefault status
unaffected
b3fdea6ecb55c3ceea866ff66486927e51a982b3 (git) before 1e2db9837be7d24a2a74eb3f3906d0872bee8907
affected
b3fdea6ecb55c3ceea866ff66486927e51a982b3 (git) before b2e74db55dd93d6db22a813c9a775b5dbf87c560
affected
Default status
affected
6.0
affected
Any version before 6.0
unaffected
6.5.3 (semver)
unaffected
6.6 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: io_uring/net: don't overflow multishot recv Don't allow overflowing multishot recv CQEs, it might get out of hand, hurt performance, and in the worst case scenario OOM the task.
Product status
b3fdea6ecb55c3ceea866ff66486927e51a982b3 (git) before 1e2db9837be7d24a2a74eb3f3906d0872bee8907
b3fdea6ecb55c3ceea866ff66486927e51a982b3 (git) before b2e74db55dd93d6db22a813c9a775b5dbf87c560
6.0
Any version before 6.0
6.5.3 (semver)
6.6 (original_commit_for_fix)
References
git.kernel.org/...c/1e2db9837be7d24a2a74eb3f3906d0872bee8907
git.kernel.org/...c/b2e74db55dd93d6db22a813c9a775b5dbf87c560
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.