Home

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring: fix incorrect io_kiocb reference in io_link_skb In io_link_skb function, there is a bug where prev_notif is incorrectly assigned using 'nd' instead of 'prev_nd'. This causes the context validation check to compare the current notification with itself instead of comparing it with the previous notification. Fix by using the correct prev_nd parameter when obtaining prev_notif.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-09 | Updated 2025-10-09 | Assigner Linux

Product status

Default status
unaffected

6fe4220912d19152a26ce19713ab232f4263018d before a89c34babc2e5834aa0905278f26f4dbe4b26b76
affected

6fe4220912d19152a26ce19713ab232f4263018d before 50a98ce1ea694f1ff8e87bc2f8f84096d1736f6a
affected

6fe4220912d19152a26ce19713ab232f4263018d before 2c139a47eff8de24e3350dadb4c9d5e3426db826
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.49
unaffected

6.16.9
unaffected

6.17
unaffected

References

git.kernel.org/...c/a89c34babc2e5834aa0905278f26f4dbe4b26b76

git.kernel.org/...c/50a98ce1ea694f1ff8e87bc2f8f84096d1736f6a

git.kernel.org/...c/2c139a47eff8de24e3350dadb4c9d5e3426db826

cve.org (CVE-2025-39963)

nvd.nist.gov (CVE-2025-39963)

Download JSON