Home

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: don't overflow multishot recv Don't allow overflowing multishot recv CQEs, it might get out of hand, hurt performance, and in the worst case scenario OOM the task.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

b3fdea6ecb55c3ceea866ff66486927e51a982b3 (git) before 1e2db9837be7d24a2a74eb3f3906d0872bee8907
affected

b3fdea6ecb55c3ceea866ff66486927e51a982b3 (git) before b2e74db55dd93d6db22a813c9a775b5dbf87c560
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.5.3 (semver)
unaffected

6.6 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1e2db9837be7d24a2a74eb3f3906d0872bee8907

git.kernel.org/...c/b2e74db55dd93d6db22a813c9a775b5dbf87c560

cve.org (CVE-2023-54030)

nvd.nist.gov (CVE-2023-54030)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.