-
CVE-2025-39698
- EPSS 0.03%
- Published 05.09.2025 17:21:04
- Last modified 10.10.2025 16:15:51
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: io_uring/futex: ensure io_futex_wait() cleans up properly on failure The io_futex_data is allocated upfront and assigned to the io_kiocb async_data field, but the request isn't marked with REQ_F_ASYNC_DATA at that point. Those two should always go together, as the flag tells io_uring whether the field is valid or not. Additionally, on failure cleanup, the futex handler frees the data but does not clear ->async_data. Clear the data and the flag in the error path as well. Thanks to Trend Micro Zero Day Initiative and particularly ReDress for reporting this.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
d9f93172820a53ab42c4b0e5e65291f4f9d00ad2
Version
194bb58c6090e39bd7d9b9c888a079213628e1f6
Status
affected
Version <
d34c04152df517c59979b4bf2a47f491e06d3256
Version
194bb58c6090e39bd7d9b9c888a079213628e1f6
Status
affected
Version <
508c1314b342b78591f51c4b5dadee31a88335df
Version
194bb58c6090e39bd7d9b9c888a079213628e1f6
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.7
Status
affected
Version <
6.7
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.44
Status
unaffected
Version <=
6.16.*
Version
6.16.4
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.056 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|