VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54030

CVE-2023-54030

Description

In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: don't overflow multishot recv

Don't allow overflowing multishot recv CQEs, it might get out of hand, hurt performance, and in the worst case scenario OOM the task.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A multishot recv overflow flaw in Linux kernel's io_uring subsystem could lead to resource exhaustion and reduced performance.

Vulnerability

Overview In the Linux kernel's io_uring subsystem, a flaw exists in the handling of multishot recv operations. The issue allows for an overflow of Completion Queue Events (CQEs) when using multishot receive requests. This can lead to excessive resource consumption, potentially causing out-of-memory (OOM) conditions for the task or significantly degrading performance [1].

Exploitation

Details To exploit this vulnerability, an attacker requires the ability to submit io_uring requests with the multishot recv flag. This typically involves having access to the io_uring interface, which may be available to unprivileged users on many Linux systems. By sending a large number of multishot recv operations, the attacker can cause CQE overflow, overwhelming the system's ability to process events efficiently [1].

Impact

The primary impact of this vulnerability is resource exhaustion. An attacker could cause the target system to run out of memory or suffer severe performance degradation. This could result in denial of service (DoS) conditions, preventing legitimate processes from executing correctly. There is no indication in the provided references of code execution or privilege escalation [1].

Mitigation

The Linux kernel has addressed this vulnerability by implementing a fix that prevents the overflow of multishot recv CQEs. The patch is included in the stable kernel tree and can be applied via standard kernel updates [1]. Systems should update to a kernel version containing this fix to mitigate the risk.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.