Home

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix user_ref race between scrub and refill paths The io_zcrx_put_niov_uref() function uses a non-atomic check-then-decrement pattern (atomic_read followed by separate atomic_dec) to manipulate user_refs. This is serialized against other callers by rq_lock, but io_zcrx_scrub() modifies the same counter with atomic_xchg() WITHOUT holding rq_lock. On SMP systems, the following race exists: CPU0 (refill, holds rq_lock) CPU1 (scrub, no rq_lock) put_niov_uref: atomic_read(uref) - 1 // window opens atomic_xchg(uref, 0) - 1 return_niov_freelist(niov) [PUSH #1] // window closes atomic_dec(uref) - wraps to -1 returns true return_niov(niov) return_niov_freelist(niov) [PUSH #2: DOUBLE-FREE] The same niov is pushed to the freelist twice, causing free_count to exceed nr_iovs. Subsequent freelist pushes then perform an out-of-bounds write (a u32 value) past the kvmalloc'd freelist array into the adjacent slab object. Fix this by replacing the non-atomic read-then-dec in io_zcrx_put_niov_uref() with an atomic_try_cmpxchg loop that atomically tests and decrements user_refs. This makes the operation safe against concurrent atomic_xchg from scrub without requiring scrub to acquire rq_lock. [pavel: removed a warning and a comment]

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-06 | Assigner Linux

Product status

Default status
unaffected

34a3e60821ab9f335a58d43a88cccdbefdebdec3 (git) before a94f096e28bfc7975163a6b80f1c8f323efe317a
affected

34a3e60821ab9f335a58d43a88cccdbefdebdec3 (git) before 485dc691257b96e6d3bdc25b0eff2daadcc5c46c
affected

34a3e60821ab9f335a58d43a88cccdbefdebdec3 (git) before 003049b1c4fb8aabb93febb7d1e49004f6ad653b
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a94f096e28bfc7975163a6b80f1c8f323efe317a

git.kernel.org/...c/485dc691257b96e6d3bdc25b0eff2daadcc5c46c

git.kernel.org/...c/003049b1c4fb8aabb93febb7d1e49004f6ad653b

cve.org (CVE-2026-43121)

nvd.nist.gov (CVE-2026-43121)

Download JSON