CVE-2025-40047
Description
In the Linux kernel, the following vulnerability has been resolved:
io_uring/waitid: always prune wait queue entry in io_waitid_wait()
For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in Linux kernel's io_uring waitid implementation can cause a use-after-free due to improper wait queue entry pruning during cancellation.
Vulnerability
In the Linux kernel's io_uring subsystem, the function io_waitid_wait() is responsible for waiting on a waitid operation. The bug occurs because the wait queue entry is not always removed from the list upon a successful return if a cancellation is in progress. This omission can lead to a race condition where the wait queue callback is invoked after the entry has been freed, resulting in a use-after-free scenario [1].
Exploitation
An attacker with local access and the ability to submit io_uring requests can exploit this race by concurrently canceling a waitid operation. The attack requires precise timing to trigger the window where the cancellation races with the normal completion path. No special privileges beyond local user access are needed, making it a potential vector for privilege escalation.
Impact
Successful exploitation of this use-after-free can lead to kernel memory corruption, denial of service, or arbitrary code execution in kernel context. This could allow an attacker to escalate privileges or crash the system.
Mitigation
The fix is included in Linux kernel stable updates. Users should apply the latest kernel patches from their distribution or the mainline kernel. There is no workaround other than updating to a patched version.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
3696ba60320813e2205db2f062f8229d53d98Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.