io_uring/kbuf: check if target buffer list is still legacy on recycle
Summary
| CVE | CVE-2026-43366 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-08 15:16:47 UTC |
| Updated | 2026-05-08 15:16:47 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
io_uring/kbuf: check if target buffer list is still legacy on recycle
There's a gap between when the buffer was grabbed and when it
potentially gets recycled, where if the list is empty, someone could've
upgraded it to a ring provided type. This can happen if the request
is forced via io-wq. The legacy recycling is missing checking if the
buffer_list still exists, and if it's of the correct type. Add those
checks. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected c7fb19428d67dd0a2a78a4f237af01d39c78dc5a a7b33671e418fca507feebd1d56e7f4952a4b25c git |
Not specified |
| CNA |
Linux |
Linux |
affected c7fb19428d67dd0a2a78a4f237af01d39c78dc5a 439a6728ec4641ffad1ca796622c19bc525e570f git |
Not specified |
| CNA |
Linux |
Linux |
affected c7fb19428d67dd0a2a78a4f237af01d39c78dc5a f3fb54e7a8b4aadcc2836ee463eec8c88709b8aa git |
Not specified |
| CNA |
Linux |
Linux |
affected c7fb19428d67dd0a2a78a4f237af01d39c78dc5a 50ad880db3013c6fee0ef13781762a39e2e7ef83 git |
Not specified |
| CNA |
Linux |
Linux |
affected c7fb19428d67dd0a2a78a4f237af01d39c78dc5a 97b57f69fee1b61b41acbf37e7720cac9d389fa4 git |
Not specified |
| CNA |
Linux |
Linux |
affected c7fb19428d67dd0a2a78a4f237af01d39c78dc5a c2c185be5c85d37215397c8e8781abf0a69bec1f git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.19 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.19 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.167 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.130 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.78 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.19 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.9 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/50ad880db3013c6fee0ef13781762a39e2e7ef83 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/97b57f69fee1b61b41acbf37e7720cac9d389fa4 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/f3fb54e7a8b4aadcc2836ee463eec8c88709b8aa |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/439a6728ec4641ffad1ca796622c19bc525e570f |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/c2c185be5c85d37215397c8e8781abf0a69bec1f |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/a7b33671e418fca507feebd1d56e7f4952a4b25c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.