
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2025-23154) was discovered in the Linux kernel affecting the iouring subsystem, specifically related to ioreqpostcqe abuse by send bundle. The issue was identified and disclosed on May 1, 2025, impacting the Linux kernel's io_uring networking functionality (NVD, Wiz).
The vulnerability involves improper handling of ioreqpostcqe() which should only be used by multishot requests (REQFAPOLLMULTISHOT), but was being incorrectly used with bundled sends. The issue manifests in the iouring/iouring.c file at line 872, triggering CPU warnings and potentially causing system instability. The vulnerability has received a CVSS v3.1 base score of 5.5 with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Red Hat).
The vulnerability affects various Linux distributions including Debian Bullseye, Bookworm, and Trixie. While Bullseye and Bookworm were marked as not affected due to the vulnerable code not being present, Trixie was marked as vulnerable until the fix was implemented (Debian Tracker).
The issue has been resolved in various Linux kernel versions. Debian has implemented fixes in version 6.12.25-1 for sid. Red Hat Enterprise Linux 9 has deferred the fix for both kernel and kernel-rt packages. Users are advised to update to the patched versions to mitigate this vulnerability (Debian Tracker, Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."