Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-71149
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-23 Jan, 2026 | 14:15
Updated At-09 Feb, 2026 | 08:35
Rejected At-
▼CVE Numbering Authority (CNA)
io_uring/poll: correctly handle io_poll_add() return value on update

In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: correctly handle io_poll_add() return value on update When the core of io_uring was updated to handle completions consistently and with fixed return codes, the POLL_REMOVE opcode with updates got slightly broken. If a POLL_ADD is pending and then POLL_REMOVE is used to update the events of that request, if that update causes the POLL_ADD to now trigger, then that completion is lost and a CQE is never posted. Additionally, ensure that if an update does cause an existing POLL_ADD to complete, that the completion value isn't always overwritten with -ECANCELED. For that case, whatever io_poll_add() set the value to should just be retained.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • io_uring/poll.c
Default Status
unaffected
Versions
Affected
  • From 97b388d70b53fd7d286ac1b81e5a88bd6af98209 before 8b777ab48441b153502772ecfc78c107d4353f29 (git)
  • From 97b388d70b53fd7d286ac1b81e5a88bd6af98209 before 0126560370ed5217958b85657b590ad25e8b9c00 (git)
  • From 97b388d70b53fd7d286ac1b81e5a88bd6af98209 before c1669c03bfbc2a9b5ebff4428eecebe734c646fe (git)
  • From 97b388d70b53fd7d286ac1b81e5a88bd6af98209 before 13a8f7b88c2d40c6b33f6216190478dda95d385f (git)
  • From 97b388d70b53fd7d286ac1b81e5a88bd6af98209 before 84230ad2d2afbf0c44c32967e525c0ad92e26b4e (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • io_uring/poll.c
Default Status
affected
Versions
Affected
  • 6.0
Unaffected
  • From 0 before 6.0 (semver)
  • From 6.1.160 through 6.1.* (semver)
  • From 6.6.120 through 6.6.* (semver)
  • From 6.12.64 through 6.12.* (semver)
  • From 6.18.3 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/8b777ab48441b153502772ecfc78c107d4353f29
N/A
https://git.kernel.org/stable/c/0126560370ed5217958b85657b590ad25e8b9c00
N/A
https://git.kernel.org/stable/c/c1669c03bfbc2a9b5ebff4428eecebe734c646fe
N/A
https://git.kernel.org/stable/c/13a8f7b88c2d40c6b33f6216190478dda95d385f
N/A
https://git.kernel.org/stable/c/84230ad2d2afbf0c44c32967e525c0ad92e26b4e
N/A
Hyperlink: https://git.kernel.org/stable/c/8b777ab48441b153502772ecfc78c107d4353f29
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0126560370ed5217958b85657b590ad25e8b9c00
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c1669c03bfbc2a9b5ebff4428eecebe734c646fe
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/13a8f7b88c2d40c6b33f6216190478dda95d385f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/84230ad2d2afbf0c44c32967e525c0ad92e26b4e
Resource: N/A
Details not found