A vulnerability was found in io_uring component of the Linux Kernel, where a double free error found due to a race condition in io_link_timeout_fn(). This occurred when a linked timeout was not properly removed from the master request list, leading to potential use-after-free issues and DoS.
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.