Home

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring/futex: ensure io_futex_wait() cleans up properly on failure The io_futex_data is allocated upfront and assigned to the io_kiocb async_data field, but the request isn't marked with REQ_F_ASYNC_DATA at that point. Those two should always go together, as the flag tells io_uring whether the field is valid or not. Additionally, on failure cleanup, the futex handler frees the data but does not clear ->async_data. Clear the data and the flag in the error path as well. Thanks to Trend Micro Zero Day Initiative and particularly ReDress for reporting this.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-05 | Updated 2025-10-17 | Assigner Linux

Product status

Default status
unaffected

194bb58c6090e39bd7d9b9c888a079213628e1f6 (git) before d9f93172820a53ab42c4b0e5e65291f4f9d00ad2
affected

194bb58c6090e39bd7d9b9c888a079213628e1f6 (git) before d34c04152df517c59979b4bf2a47f491e06d3256
affected

194bb58c6090e39bd7d9b9c888a079213628e1f6 (git) before 508c1314b342b78591f51c4b5dadee31a88335df
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.12.44 (semver)
unaffected

6.16.4 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/d9f93172820a53ab42c4b0e5e65291f4f9d00ad2

git.kernel.org/...c/d34c04152df517c59979b4bf2a47f491e06d3256

git.kernel.org/...c/508c1314b342b78591f51c4b5dadee31a88335df

www.zerodayinitiative.com/advisories/ZDI-25-915/

cve.org (CVE-2025-39698)

nvd.nist.gov (CVE-2025-39698)

Download JSON