{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T13:01:15.176","vulnerabilities":[{"cve":{"id":"CVE-2023-52895","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-08-21T07:15:06.007","lastModified":"2024-09-11T16:31:31.597","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/poll: don't reissue in case of poll race on multishot request\n\nA previous commit fixed a poll race that can occur, but it's only\napplicable for multishot requests. For a multishot request, we can safely\nignore a spurious wakeup, as we never leave the waitqueue to begin with.\n\nA blunt reissue of a multishot armed request can cause us to leak a\nbuffer, if they are ring provided. While this seems like a bug in itself,\nit's not really defined behavior to reissue a multishot request directly.\nIt's less efficient to do so as well, and not required to rearm anything\nlike it is for singleshot poll requests."},{"lang":"es","value":"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: io_uring/poll: no volver a emitir en caso de ejecución de sondeo en solicitud de múltiples disparos. Una confirmación anterior solucionó una ejecución de sondeo que puede ocurrir, pero solo se aplica a solicitudes de múltiples disparos. Para una solicitud de disparo múltiple, podemos ignorar con seguridad una activación espuria, ya que, para empezar, nunca salimos de la cola de espera. Una reemisión contundente de una solicitud de armado de múltiples disparos puede hacer que perdamos un búfer, si se proporciona en anillo. Si bien esto parece un error en sí mismo, en realidad no es un comportamiento definido volver a emitir una solicitud multidisparo directamente. También es menos eficiente hacerlo y no es necesario rearmar nada como lo es para solicitudes de sondeo de un solo disparo."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*","matchCriteriaId":"6E5E3E6D-B23E-4B23-9819-3DEB8963E4E3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/36fc7317cdb16cfeae0f879916995037bb615ac4","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/8caa03f10bf92cb8657408a6ece6a8a73f96ce13","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}