-

CVE-2025-39698

In the Linux kernel, the following vulnerability has been resolved:

io_uring/futex: ensure io_futex_wait() cleans up properly on failure

The io_futex_data is allocated upfront and assigned to the io_kiocb
async_data field, but the request isn't marked with REQ_F_ASYNC_DATA
at that point. Those two should always go together, as the flag tells
io_uring whether the field is valid or not.

Additionally, on failure cleanup, the futex handler frees the data but
does not clear ->async_data. Clear the data and the flag in the error
path as well.

Thanks to Trend Micro Zero Day Initiative and particularly ReDress for
reporting this.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < d9f93172820a53ab42c4b0e5e65291f4f9d00ad2
Version 194bb58c6090e39bd7d9b9c888a079213628e1f6
Status affected
Version < d34c04152df517c59979b4bf2a47f491e06d3256
Version 194bb58c6090e39bd7d9b9c888a079213628e1f6
Status affected
Version < 508c1314b342b78591f51c4b5dadee31a88335df
Version 194bb58c6090e39bd7d9b9c888a079213628e1f6
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.7
Status affected
Version < 6.7
Version 0
Status unaffected
Version <= 6.12.*
Version 6.12.44
Status unaffected
Version <= 6.16.*
Version 6.16.4
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.056
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string