VYPR
Unrated severityNVD Advisory· Published Oct 28, 2025· Updated Apr 15, 2026

CVE-2025-40047

CVE-2025-40047

Description

In the Linux kernel, the following vulnerability has been resolved:

io_uring/waitid: always prune wait queue entry in io_waitid_wait()

For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A race condition in Linux kernel's io_uring waitid implementation can cause a use-after-free due to improper wait queue entry pruning during cancellation.

Vulnerability

In the Linux kernel's io_uring subsystem, the function io_waitid_wait() is responsible for waiting on a waitid operation. The bug occurs because the wait queue entry is not always removed from the list upon a successful return if a cancellation is in progress. This omission can lead to a race condition where the wait queue callback is invoked after the entry has been freed, resulting in a use-after-free scenario [1].

Exploitation

An attacker with local access and the ability to submit io_uring requests can exploit this race by concurrently canceling a waitid operation. The attack requires precise timing to trigger the window where the cancellation races with the normal completion path. No special privileges beyond local user access are needed, making it a potential vector for privilege escalation.

Impact

Successful exploitation of this use-after-free can lead to kernel memory corruption, denial of service, or arbitrary code execution in kernel context. This could allow an attacker to escalate privileges or crash the system.

Mitigation

The fix is included in Linux kernel stable updates. Users should apply the latest kernel patches from their distribution or the mainline kernel. There is no workaround other than updating to a patched version.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.