CVE-2023-54041
Description
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix memory leak when removing provided buffers
When removing provided buffers, io_buffer structs are not being disposed of, leading to a memory leak. They can't be freed individually, because they are allocated in page-sized groups. They need to be added to some free list instead, such as io_buffers_cache. All callers already hold the lock protecting it, apart from when destroying buffers, so had to extend the lock there.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's io_uring subsystem when removing provided buffers could lead to resource exhaustion.
The vulnerability resides in the Linux kernel's io_uring subsystem, specifically in the code path that removes provided buffers. When buffers are removed, the io_buffer structures that manage them are not properly disposed of, leading to a memory leak. These structures are allocated in page-sized groups, so they cannot be freed individually; they need to be returned to a free list such as io_buffers_cache.
The leak occurs because the callers that remove buffers do not always add the freed buffer groups to the appropriate free list. The fix involves ensuring that all callers, particularly during buffer destruction, properly add the freed memory to the cache. The destruction path previously did not hold the necessary lock (uring_lock), so the patch extends the lock coverage to safely update the free list.
An attacker with local access and the ability to trigger repeated buffer removals could exploit this leak to exhaust system memory, potentially leading to a denial-of-service condition. No other privileges beyond standard user access to io_uring are required.
The issue is fixed in the Linux kernel with commits [1] and [2], which have been backported to stable releases. Users should update their kernel to the latest patched version to mitigate the vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3ac48787f58d1c117c1592777b4a72c0589fdVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.