Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68294

Опубликовано: 16 дек. 2025
Источник: redhat
CVSS3: 6.6
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: ensure vectored buffer node import is tied to notification When support for vectored registered buffers was added, the import itself is using 'req' rather than the notification io_kiocb, sr->notif. For non-vectored imports, sr->notif is correctly used. This is important as the lifetime of the two may be different. Use the correct io_kiocb for the vectored buffer import.

A flaw was found in the Linux kernel's io_uring/net component. This vulnerability arises from an incorrect handling of vectored buffer node imports, where the system uses an improper object for managing buffer lifetimes. A local attacker could exploit this to cause a Denial of Service (DoS), making the system unavailable.

Отчет

A lifetime mismatch in io_uring's vectored registered buffer import ties the buffer to the wrong io_kiocb, potentially leading to use-after-free when the main request is freed before the associated notification. A local attacker able to use io_uring with vectored registered buffers may trigger memory corruption in kernel context. The issue is locally exploitable and may allow privilege escalation due to heap UAF in the networking zero-copy path.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-99
https://bugzilla.redhat.com/show_bug.cgi?id=2422837kernel: Linux kernel: Denial of Service in io_uring/net due to incorrect buffer handling

EPSS

Процентиль: 8%
0.00027
Низкий

6.6 Medium

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: ensure vectored buffer node import is tied to notification When support for vectored registered buffers was added, the import itself is using 'req' rather than the notification io_kiocb, sr->notif. For non-vectored imports, sr->notif is correctly used. This is important as the lifetime of the two may be different. Use the correct io_kiocb for the vectored buffer import.

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: ensure vectored buffer node import is tied to notification When support for vectored registered buffers was added, the import itself is using 'req' rather than the notification io_kiocb, sr->notif. For non-vectored imports, sr->notif is correctly used. This is important as the lifetime of the two may be different. Use the correct io_kiocb for the vectored buffer import.

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: ensure vectored buffer node import is tied to notification When support for vectored registered buffers was added, the import itself is using 'req' rather than the notification io_kiocb, sr->notif. For non-vectored imports, sr->notif is correctly used. This is important as the lifetime of the two may be different. Use the correct io_kiocb for the vectored buffer import.

EPSS

Процентиль: 8%
0.00027
Низкий

6.6 Medium

CVSS3