In the Linux kernel, the following vulnerability has been resolved:
io_uring: fail cancellation for EXITING tasks
WARNING: CPU: 1 PID: 20 at fs/iouring.c:6269 iotrycanceluserdata+0x3c5/0x640 fs/iouring.c:6269 CPU: 1 PID: 20 Comm: kworker/1:0 Not tainted 5.16.0-rc1-syzkaller #0 Workqueue: events iofallbackreqfunc RIP: 0010:iotrycanceluserdata+0x3c5/0x640 fs/iouring.c:6269 Call Trace: <TASK> ioreqtasklinktimeout+0x6b/0x1e0 fs/iouring.c:6886 iofallbackreqfunc+0xf9/0x1ae fs/iouring.c:1334 processonework+0x9b2/0x1690 kernel/workqueue.c:2298 workerthread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 retfromfork+0x1f/0x30 arch/x86/entry/entry_64.S:295 </TASK>
We need original task's context to do cancellations, so if it's dying and the callback is executed in a fallback mode, fail the cancellation attempt.