CVE-2025-40047
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-28

Last updated on: 2025-10-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: io_uring/waitid: always prune wait queue entry in io_waitid_wait() For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-28
Last Modified
2025-10-30
Generated
2026-05-07
AI Q&A
2025-10-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves the io_uring subsystem's wait queue handling. Specifically, the function io_waitid_wait() did not always remove its entry from the wait queue if a cancellation was in progress, which could cause a race condition with another invocation of the wait queue entry callback. The fix ensures that the wait queue entry is always pruned on a successful return to prevent this race condition.


How can this vulnerability impact me? :

The vulnerability could lead to race conditions in the kernel's io_uring wait queue handling, potentially causing unexpected behavior such as resource leaks, deadlocks, or kernel instability. This could impact system reliability and security depending on how io_uring is used.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart