Home

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: correctly handle io_poll_add() return value on update When the core of io_uring was updated to handle completions consistently and with fixed return codes, the POLL_REMOVE opcode with updates got slightly broken. If a POLL_ADD is pending and then POLL_REMOVE is used to update the events of that request, if that update causes the POLL_ADD to now trigger, then that completion is lost and a CQE is never posted. Additionally, ensure that if an update does cause an existing POLL_ADD to complete, that the completion value isn't always overwritten with -ECANCELED. For that case, whatever io_poll_add() set the value to should just be retained.

PUBLISHED Reserved 2026-01-13 | Published 2026-01-23 | Updated 2026-02-09 | Assigner Linux

Product status

Default status
unaffected

97b388d70b53fd7d286ac1b81e5a88bd6af98209 (git) before 8b777ab48441b153502772ecfc78c107d4353f29
affected

97b388d70b53fd7d286ac1b81e5a88bd6af98209 (git) before 0126560370ed5217958b85657b590ad25e8b9c00
affected

97b388d70b53fd7d286ac1b81e5a88bd6af98209 (git) before c1669c03bfbc2a9b5ebff4428eecebe734c646fe
affected

97b388d70b53fd7d286ac1b81e5a88bd6af98209 (git) before 13a8f7b88c2d40c6b33f6216190478dda95d385f
affected

97b388d70b53fd7d286ac1b81e5a88bd6af98209 (git) before 84230ad2d2afbf0c44c32967e525c0ad92e26b4e
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.1.160 (semver)
unaffected

6.6.120 (semver)
unaffected

6.12.64 (semver)
unaffected

6.18.3 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8b777ab48441b153502772ecfc78c107d4353f29

git.kernel.org/...c/0126560370ed5217958b85657b590ad25e8b9c00

git.kernel.org/...c/c1669c03bfbc2a9b5ebff4428eecebe734c646fe

git.kernel.org/...c/13a8f7b88c2d40c6b33f6216190478dda95d385f

git.kernel.org/...c/84230ad2d2afbf0c44c32967e525c0ad92e26b4e

cve.org (CVE-2025-71149)

nvd.nist.gov (CVE-2025-71149)

Download JSON