{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-23154","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-01-11T14:28:41.513Z","datePublished":"2025-05-01T12:55:40.923Z","dateUpdated":"2026-05-11T21:13:59.872Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:13:59.872Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/net: fix io_req_post_cqe abuse by send bundle\n\n[  114.987980][ T5313] WARNING: CPU: 6 PID: 5313 at io_uring/io_uring.c:872 io_req_post_cqe+0x12e/0x4f0\n[  114.991597][ T5313] RIP: 0010:io_req_post_cqe+0x12e/0x4f0\n[  115.001880][ T5313] Call Trace:\n[  115.002222][ T5313]  <TASK>\n[  115.007813][ T5313]  io_send+0x4fe/0x10f0\n[  115.009317][ T5313]  io_issue_sqe+0x1a6/0x1740\n[  115.012094][ T5313]  io_wq_submit_work+0x38b/0xed0\n[  115.013223][ T5313]  io_worker_handle_work+0x62a/0x1600\n[  115.013876][ T5313]  io_wq_worker+0x34f/0xdf0\n\nAs the comment states, io_req_post_cqe() should only be used by\nmultishot requests, i.e. REQ_F_APOLL_MULTISHOT, which bundled sends are\nnot. Add a flag signifying whether a request wants to post multiple\nCQEs. Eventually REQ_F_APOLL_MULTISHOT should imply the new flag, but\nthat's left out for simplicity."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/linux/io_uring_types.h","io_uring/io_uring.c","io_uring/net.c"],"versions":[{"version":"a05d1f625c7aa681d8816bc0f10089289ad07aad","lessThan":"b7c6d081c19a5e11bbd77bb97a62cff2b6b21cb5","status":"affected","versionType":"git"},{"version":"a05d1f625c7aa681d8816bc0f10089289ad07aad","lessThan":"7888c9fc0b2d3636f2e821ed1ad3c6920fa8e378","status":"affected","versionType":"git"},{"version":"a05d1f625c7aa681d8816bc0f10089289ad07aad","lessThan":"9aa804e6b9696998308095fb9d335046a71550f1","status":"affected","versionType":"git"},{"version":"a05d1f625c7aa681d8816bc0f10089289ad07aad","lessThan":"6889ae1b4df1579bcdffef023e2ea9a982565dff","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/linux/io_uring_types.h","io_uring/io_uring.c","io_uring/net.c"],"versions":[{"version":"6.10","status":"affected"},{"version":"0","lessThan":"6.10","status":"unaffected","versionType":"semver"},{"version":"6.12.24","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.12","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14.3","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.12.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.13.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.14.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b7c6d081c19a5e11bbd77bb97a62cff2b6b21cb5"},{"url":"https://git.kernel.org/stable/c/7888c9fc0b2d3636f2e821ed1ad3c6920fa8e378"},{"url":"https://git.kernel.org/stable/c/9aa804e6b9696998308095fb9d335046a71550f1"},{"url":"https://git.kernel.org/stable/c/6889ae1b4df1579bcdffef023e2ea9a982565dff"}],"title":"io_uring/net: fix io_req_post_cqe abuse by send bundle","x_generator":{"engine":"bippy-1.2.0"}}}}