๐Ÿ” CVE Alert

CVE-2026-43121

UNKNOWN 0.0

io_uring/zcrx: fix user_ref race between scrub and refill paths

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix user_ref race between scrub and refill paths The io_zcrx_put_niov_uref() function uses a non-atomic check-then-decrement pattern (atomic_read followed by separate atomic_dec) to manipulate user_refs. This is serialized against other callers by rq_lock, but io_zcrx_scrub() modifies the same counter with atomic_xchg() WITHOUT holding rq_lock. On SMP systems, the following race exists: CPU0 (refill, holds rq_lock) CPU1 (scrub, no rq_lock) put_niov_uref: atomic_read(uref) - 1 // window opens atomic_xchg(uref, 0) - 1 return_niov_freelist(niov) [PUSH #1] // window closes atomic_dec(uref) - wraps to -1 returns true return_niov(niov) return_niov_freelist(niov) [PUSH #2: DOUBLE-FREE] The same niov is pushed to the freelist twice, causing free_count to exceed nr_iovs. Subsequent freelist pushes then perform an out-of-bounds write (a u32 value) past the kvmalloc'd freelist array into the adjacent slab object. Fix this by replacing the non-atomic read-then-dec in io_zcrx_put_niov_uref() with an atomic_try_cmpxchg loop that atomically tests and decrements user_refs. This makes the operation safe against concurrent atomic_xchg from scrub without requiring scrub to acquire rq_lock. [pavel: removed a warning and a comment]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 6, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
34a3e60821ab9f335a58d43a88cccdbefdebdec3 < a94f096e28bfc7975163a6b80f1c8f323efe317a 34a3e60821ab9f335a58d43a88cccdbefdebdec3 < 485dc691257b96e6d3bdc25b0eff2daadcc5c46c 34a3e60821ab9f335a58d43a88cccdbefdebdec3 < 003049b1c4fb8aabb93febb7d1e49004f6ad653b
Linux / Linux
6.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a94f096e28bfc7975163a6b80f1c8f323efe317a git.kernel.org: https://git.kernel.org/stable/c/485dc691257b96e6d3bdc25b0eff2daadcc5c46c git.kernel.org: https://git.kernel.org/stable/c/003049b1c4fb8aabb93febb7d1e49004f6ad653b