CVE-2026-43174
Awaiting Analysis Awaiting Analysis - Queue
io_uring/zcrx Post-Open Error Handling Flaw

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix post open error handling Closing a queue doesn't guarantee that all associated page pools are terminated right away, let the refcounting do the work instead of releasing the zcrx ctx directly.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel relates to the io_uring subsystem, specifically the zcrx component. The issue involves improper error handling after opening a queue. When a queue is closed, the associated page pools are not immediately terminated; instead, the system should rely on reference counting to manage the lifecycle of these resources. The vulnerability was fixed by correcting this post-open error handling to prevent premature release of the zcrx context.


How can this vulnerability impact me? :

This vulnerability relates to improper error handling in the Linux kernel's io_uring subsystem, specifically in the zcrx context. The issue involves closing a queue without guaranteeing that all associated page pools are terminated immediately, relying instead on reference counting. This could potentially lead to resource management issues such as memory leaks or unexpected behavior in kernel operations involving io_uring.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart