VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54041

CVE-2023-54041

Description

In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix memory leak when removing provided buffers

When removing provided buffers, io_buffer structs are not being disposed of, leading to a memory leak. They can't be freed individually, because they are allocated in page-sized groups. They need to be added to some free list instead, such as io_buffers_cache. All callers already hold the lock protecting it, apart from when destroying buffers, so had to extend the lock there.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's io_uring subsystem when removing provided buffers could lead to resource exhaustion.

The vulnerability resides in the Linux kernel's io_uring subsystem, specifically in the code path that removes provided buffers. When buffers are removed, the io_buffer structures that manage them are not properly disposed of, leading to a memory leak. These structures are allocated in page-sized groups, so they cannot be freed individually; they need to be returned to a free list such as io_buffers_cache.

The leak occurs because the callers that remove buffers do not always add the freed buffer groups to the appropriate free list. The fix involves ensuring that all callers, particularly during buffer destruction, properly add the freed memory to the cache. The destruction path previously did not hold the necessary lock (uring_lock), so the patch extends the lock coverage to safely update the free list.

An attacker with local access and the ability to trigger repeated buffer removals could exploit this leak to exhaust system memory, potentially leading to a denial-of-service condition. No other privileges beyond standard user access to io_uring are required.

The issue is fixed in the Linux kernel with commits [1] and [2], which have been backported to stable releases. Users should update their kernel to the latest patched version to mitigate the vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.