VYPR
Unrated severityNVD Advisory· Published Oct 28, 2025· Updated Apr 15, 2026

CVE-2025-40046

CVE-2025-40046

Description

In the Linux kernel, the following vulnerability has been resolved:

io_uring/zcrx: fix overshooting recv limit

It's reported that sometimes a zcrx request can receive more than was requested. It's caused by io_zcrx_recv_skb() adjusting desc->count for all received buffers including frag lists, but then doing recursive calls to process frag list skbs, which leads to desc->count double accounting and underflow.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, io_uring/zcrx recv limit can be exceeded due to double accounting of desc->count when processing frag list skbs.

Vulnerability

Overview

A bug in the Linux kernel's io_uring zero-copy receive (zcrx) implementation can cause a request to receive more data than was requested. The root cause is in io_zcrx_recv_skb(), which adjusts desc->count for all received buffers, including those in frag lists. However, when processing frag list skbs recursively, desc->count is decremented again, leading to double accounting and an underflow that allows the receive limit to be overshot [1].

Exploitation

An attacker would need to be able to trigger the zcrx path, which typically requires local access and the ability to set up io_uring with zero-copy receive. The vulnerability is triggered when a received packet has a frag list, causing the recursive processing that leads to the double decrement. No special privileges beyond being able to use io_uring are required, but the attack surface is limited to local users or processes that can interact with the kernel's networking subsystem.

Impact

A successful exploit could allow a local attacker to cause a receive operation to consume more data than intended, potentially leading to memory corruption or information disclosure. The exact impact depends on how the overshoot is handled, but it could result in a denial of service or privilege escalation if the extra data overwrites critical kernel structures.

Mitigation

The fix is included in the Linux kernel stable tree as commit 8bcc9eaf1b19 [1]. Users should update their kernels to a version containing this patch. No workaround is available; the vulnerability is addressed by applying the kernel update.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.