CVE-2023-52656

Source
https://cve.org/CVERecord?id=CVE-2023-52656
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52656.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52656
Downstream
Related
Published
2024-05-13T13:12:35.333Z
Modified
2026-04-11T11:57:17.279026Z
Summary
io_uring: drop any code related to SCM_RIGHTS
Details

In the Linux kernel, the following vulnerability has been resolved:

iouring: drop any code related to SCMRIGHTS

This is dead code after we dropped support for passing iouring fds over SCMRIGHTS, get rid of it.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52656.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2b188cc1bb857a9d4701ae59aa7768b5124e262e
Fixed
cfb24022bb2c31f1f555dc6bc3cc5e2547446fb3
Fixed
a6771f343af90a25f3a14911634562bb5621df02
Fixed
d909d381c3152393421403be4b6435f17a2378b4
Fixed
a3812a47a32022ca76bf46ddacdd823dc2aabf8b
Fixed
6fc19b3d8a45ff0e5d50ec8184cee1d5eac1a8ba
Fixed
88c49d9c896143cdc0f77197c4dcf24140375e89
Fixed
6e5e6d274956305f1fc0340522b38f5f5be74bdb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52656.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
5.4.273
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.214
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.153
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.83
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.23
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52656.json"