Description
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A race condition exists in the Linux kernel’s io_uring poll implementation that can cause a multishot receive loop to hang indefinitely. The bug arises when a socket send is immediately followed by a shutdown, leading to the kernel losing a HUP event. As a result, the application may wait forever for an end‑of‑file that never arrives, causing a service stop or process freeze in the affected system.

Affected Systems

All Linux kernel versions prior to the patch referenced in the commit series are affected. The only CNA vendor/product listed is Linux:Linux, and no specific version ranges are provided, so any kernel before the fix is potentially vulnerable. Users should verify their kernel version against the commit history for this fix.

Risk and Exploitability

The CVSS score of 5.5 indicates medium severity, and the EPSS score is below 1 %, suggesting a low likelihood of exploitation in the wild. The CVE is not listed in the KEV catalog. Based on the description, the attack vector is inferred to be either local or remote control of socket traffic that triggers the vulnerable sequence; exploitation would require the ability to send data over a socket that uses the multishot receive loop and then perform a shutdown to induce a hang.

Generated by OpenCVE AI on April 7, 2026 at 10:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the io_uring poll race condition fix.
  • If an immediate kernel upgrade is not feasible, avoid calling shutdown() immediately after a send on sockets that use the multishot receive feature.
  • Restart any processes that may be stuck in a hung receive loop after applying the patch.

Generated by OpenCVE AI on April 7, 2026 at 10:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 07:30:00 +0000


Sat, 02 May 2026 06:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: fix multishot recv missing EOF on wakeup race When a socket send and shutdown() happen back-to-back, both fire wake-ups before the receiver's task_work has a chance to run. The first wake gets poll ownership (poll_refs=1), and the second bumps it to 2. When io_poll_check_events() runs, it calls io_poll_issue() which does a recv that reads the data and returns IOU_RETRY. The loop then drains all accumulated refs (atomic_sub_return(2) -> 0) and exits, even though only the first event was consumed. Since the shutdown is a persistent state change, no further wakeups will happen, and the multishot recv can hang forever. Check specifically for HUP in the poll loop, and ensure that another loop is done to check for status if more than a single poll activation is pending. This ensures we don't lose the shutdown event. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title io_uring/poll: fix multishot recv missing EOF on wakeup race kernel: io_uring/poll: fix multishot recv missing EOF on wakeup race
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-367
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: fix multishot recv missing EOF on wakeup race When a socket send and shutdown() happen back-to-back, both fire wake-ups before the receiver's task_work has a chance to run. The first wake gets poll ownership (poll_refs=1), and the second bumps it to 2. When io_poll_check_events() runs, it calls io_poll_issue() which does a recv that reads the data and returns IOU_RETRY. The loop then drains all accumulated refs (atomic_sub_return(2) -> 0) and exits, even though only the first event was consumed. Since the shutdown is a persistent state change, no further wakeups will happen, and the multishot recv can hang forever. Check specifically for HUP in the poll loop, and ensure that another loop is done to check for status if more than a single poll activation is pending. This ensures we don't lose the shutdown event.
Title io_uring/poll: fix multishot recv missing EOF on wakeup race
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2026-05-02T06:17:49.349Z

Reserved: 2026-01-13T15:37:46.022Z

Link: CVE-2026-23473

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2026-04-03T16:16:35.120

Modified: 2026-05-02T07:16:18.483

Link: CVE-2026-23473

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23473 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:37Z

Weaknesses