๐Ÿ” CVE Alert

CVE-2024-50060

UNKNOWN 0.0

io_uring: check if we need to reschedule during overflow flush

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: io_uring: check if we need to reschedule during overflow flush In terms of normal application usage, this list will always be empty. And if an application does overflow a bit, it'll have a few entries. However, nothing obviously prevents syzbot from running a test case that generates a ton of overflow entries, and then flushing them can take quite a while. Check for needing to reschedule while flushing, and drop our locks and do so if necessary. There's no state to maintain here as overflows always prune from head-of-list, hence it's fine to drop and reacquire the locks at the end of the loop.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2b188cc1bb857a9d4701ae59aa7768b5124e262e < a2493904e95ce94bbec819d8f7f03b99976eb25c 2b188cc1bb857a9d4701ae59aa7768b5124e262e < f4ce3b5d26ce149e77e6b8e8f2058aa80e5b034e 2b188cc1bb857a9d4701ae59aa7768b5124e262e < c2eadeafce2d385b3f6d26a7f31fee5aba2bbbb0 2b188cc1bb857a9d4701ae59aa7768b5124e262e < eac2ca2d682f94f46b1973bdf5e77d85d77b8e53
Linux / Linux
5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a2493904e95ce94bbec819d8f7f03b99976eb25c git.kernel.org: https://git.kernel.org/stable/c/f4ce3b5d26ce149e77e6b8e8f2058aa80e5b034e git.kernel.org: https://git.kernel.org/stable/c/c2eadeafce2d385b3f6d26a7f31fee5aba2bbbb0 git.kernel.org: https://git.kernel.org/stable/c/eac2ca2d682f94f46b1973bdf5e77d85d77b8e53 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html