In the Linux kernel, the following vulnerability has been resolved:
io_uring/poll: add hash if ready poll request can’t complete inline
If we don’t, then we may lose access to it completely, leading to a
request leak. This will eventually stall the ring exit process as
well.
git.kernel.org/linus/febb985c06cb6f5fac63598c0bffd4fd823d110d (6.2-rc4)
git.kernel.org/stable/c/4ad6c063541665c407d17e1faf2fe4f04e947dcc
git.kernel.org/stable/c/febb985c06cb6f5fac63598c0bffd4fd823d110d
launchpad.net/bugs/cve/CVE-2023-52914
nvd.nist.gov/vuln/detail/CVE-2023-52914
security-tracker.debian.org/tracker/CVE-2023-52914
www.cve.org/CVERecord?id=CVE-2023-52914