Description
In the Linux kernel, the following vulnerability has been resolved:

io_uring/rw: free potentially allocated iovec on cache put failure

If a read/write request goes through io_req_rw_cleanup() and has an
allocated iovec attached and fails to put to the rw_cache, then it may
end up with an unaccounted iovec pointer. Have io_rw_recycle() return
whether it recycled the request or not, and use that to gauge whether to
free a potential iovec or not.
Published: 2026-03-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

This vulnerability arises when a read or write request processed by io_uring's cleanup routine fails to be stored in the rw_cache yet an I/O vector (ovec) has been allocated. Because the cleanup path does not free the leftover iovec, each failure results in a retained memory allocation. Over time, repeated failures can cause unreclaimed kernel memory usage to grow, degrading system stability. The root weakness is a memory leak, which can lead to resource exhaustion.

Affected Systems

Affected systems are Linux kernel implementations that use the io_uring subsystem, specifically the rw_cache component. The issue appears in all kernel releases prior to the inclusion of the commit that resolves the problem; a specific version range is not provided. Systems running a kernel without the fix are susceptible.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity. EPSS indicates that the likelihood of exploitation is very low (<1 %) and the vulnerability is not listed in the CISA KEV catalog. A local attacker who can generate numerous io_uring read/write operations that fail to cache could exploit the bug, causing memory exhaustion and potential denial of service. The attack vector is inferred to be local and related to kernel I/O handling; no remote exploitation pathway is described.

Generated by OpenCVE AI on March 27, 2026 at 21:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel that includes the fixed commit 1d5f2329.
  • If kernel upgrade is not an immediate option, consider disabling or limiting io_uring usage until the patch can be applied.
  • Monitor system logs for io_uring cache put failures and watch for memory growth.

Generated by OpenCVE AI on March 27, 2026 at 21:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-204
CWE-401

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CWE-416

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CWE-416

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-415
CWE-416

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-415
CWE-416

Thu, 19 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 18 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: io_uring/rw: free potentially allocated iovec on cache put failure If a read/write request goes through io_req_rw_cleanup() and has an allocated iovec attached and fails to put to the rw_cache, then it may end up with an unaccounted iovec pointer. Have io_rw_recycle() return whether it recycled the request or not, and use that to gauge whether to free a potential iovec or not.
Title io_uring/rw: free potentially allocated iovec on cache put failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-03-19T16:01:03.743Z

Reserved: 2026-01-13T15:37:45.990Z

Link: CVE-2026-23259

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-18T18:16:24.353

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-23259

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-23259 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:29:00Z

Weaknesses