Home

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring/waitid: always prune wait queue entry in io_waitid_wait() For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-28 | Updated 2025-10-28 | Assigner Linux

Product status

Default status
unaffected

f31ecf671ddc498f20219453395794ff2383e06b (git) before 696ba6032081e617564a8113a001b8d7943cb928
affected

f31ecf671ddc498f20219453395794ff2383e06b (git) before 3e2205db2f0608898d535da1964e1b376aacfdaa
affected

f31ecf671ddc498f20219453395794ff2383e06b (git) before 2f8229d53d984c6a05b71ac9e9583d4354e3b91f
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.12.53 (semver)
unaffected

6.17.3 (semver)
unaffected

6.18-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/696ba6032081e617564a8113a001b8d7943cb928

git.kernel.org/...c/3e2205db2f0608898d535da1964e1b376aacfdaa

git.kernel.org/...c/2f8229d53d984c6a05b71ac9e9583d4354e3b91f

cve.org (CVE-2025-40047)

nvd.nist.gov (CVE-2025-40047)

Download JSON