Description
In the Linux kernel, the following vulnerability has been resolved: io_uring/futex: ensure io_futex_wait() cleans up properly on failure The io_futex_data is allocated upfront and assigned to the io_kiocb async_data field, but the request isn't marked with REQ_F_ASYNC_DATA at that point. Those two should always go together, as the flag tells io_uring whether the field is valid or not. Additionally, on failure cleanup, the futex handler frees the data but does not clear ->async_data. Clear the data and the flag in the error path as well. Thanks to Trend Micro Zero Day Initiative and particularly ReDress for reporting this.
References (4)
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
5.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-416
CWE-672
Status
published
Products (4)
linux/Kernel
6.13.0 - 6.16.4linux
linux/Kernel
6.7.0 - 6.12.44linux
linux/linux_kernel
6.17 rc1 (2 CPE variants)
linux/linux_kernel
6.7 - 6.12.44
Published
Sep 05, 2025
Tracked Since
Feb 18, 2026