Impact
A race condition exists in the Linux kernel’s io_uring poll implementation that can cause a multishot receive loop to hang indefinitely. The bug arises when a socket send is immediately followed by a shutdown, leading to the kernel losing a HUP event. As a result, the application may wait forever for an end‑of‑file that never arrives, causing a service stop or process freeze in the affected system.
Affected Systems
All Linux kernel versions prior to the patch referenced in the commit series are affected. The only CNA vendor/product listed is Linux:Linux, and no specific version ranges are provided, so any kernel before the fix is potentially vulnerable. Users should verify their kernel version against the commit history for this fix.
Risk and Exploitability
The CVSS score of 5.5 indicates medium severity, and the EPSS score is below 1 %, suggesting a low likelihood of exploitation in the wild. The CVE is not listed in the KEV catalog. Based on the description, the attack vector is inferred to be either local or remote control of socket traffic that triggers the vulnerable sequence; exploitation would require the ability to send data over a socket that uses the multishot receive loop and then perform a shutdown to induce a hang.
OpenCVE Enrichment