{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T08:07:03.575","vulnerabilities":[{"cve":{"id":"CVE-2023-54081","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-24T13:16:09.950","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nxen: speed up grant-table reclaim\n\nWhen a grant entry is still in use by the remote domain, Linux must put\nit on a deferred list.  Normally, this list is very short, because\nthe PV network and block protocols expect the backend to unmap the grant\nfirst.  However, Qubes OS's GUI protocol is subject to the constraints\nof the X Window System, and as such winds up with the frontend unmapping\nthe window first.  As a result, the list can grow very large, resulting\nin a massive memory leak and eventual VM freeze.\n\nTo partially solve this problem, make the number of entries that the VM\nwill attempt to free at each iteration tunable.  The default is still\n10, but it can be overridden via a module parameter.\n\nThis is Cc: stable because (when combined with appropriate userspace\nchanges) it fixes a severe performance and stability problem for Qubes\nOS users."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/c04e9894846c663f3278a414f34416e6e45bbe68","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/c76d96c555895ac602c1587b001e5cf656abc371","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/cd1a8952ff529adc210e62306849fd6f256608c0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}