Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40047

Опубликовано: 28 окт. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: io_uring/waitid: always prune wait queue entry in io_waitid_wait() For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.

A flaw use after free in the Linux kernel IO_URING subsystem was found in the way local user uses io_uring interface (using IORING_OP_WAITID). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

Отчет

io_waitid_wait() didn’t always prune the wait-queue entry on success when a cancellation was in progress, leaving the entry on the list and racing with another callback, which could lead to double callbacks and list corruption (potential UAF). The IO_URING enabled only in latest versions of Red Hat Enterprise Linux (from 9.3).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 10kernelFixedRHSA-2025:2285409.12.2025
Red Hat Enterprise Linux 10.0 Extended Update SupportkernelFixedRHSA-2026:172702.02.2026
Red Hat Enterprise Linux 9kernelFixedRHSA-2025:2146917.11.2025
Red Hat Enterprise Linux 9kernelFixedRHSA-2025:2146917.11.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-662
https://bugzilla.redhat.com/show_bug.cgi?id=2406758kernel: io_uring/waitid: always prune wait queue entry in io_waitid_wait()

EPSS

Процентиль: 9%
0.00032
Низкий

7.8 High

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/waitid: always prune wait queue entry in io_waitid_wait() For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/waitid: always prune wait queue entry in io_waitid_wait() For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.

debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i ...

github
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/waitid: always prune wait queue entry in io_waitid_wait() For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.

CVSS3: 4.7
fstec
6 месяцев назад

Уязвимость функции io_waitid_wait() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 9%
0.00032
Низкий

7.8 High

CVSS3