CVE-2025-38730

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: commit partial buffers on retry Ring provided buffers are potentially only valid within the single execution context in which they were acquired. io_uring deals with this and invalidates them on retry. But on the networking side, if MSG_WAITALL is set, or if the socket is of the streaming type and too little was processed, then it will hang on to the buffer rather than recycle or commit it. This is problematic for two reasons: 1) If someone unregisters the provided buffer ring before a later retry, then the req->buf_list will no longer be valid. 2) If multiple sockers are using the same buffer group, then multiple receives can consume the same memory. This can cause data corruption in the application, as either receive could land in the same userspace buffer. Fix this by disallowing partial retries from pinning a provided buffer across multiple executions, if ring provided buffers are used.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*

History

25 Nov 2025, 21:50

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/21a4ddb0f5e933f372808c10b9ac704505751bb1 - () https://git.kernel.org/stable/c/21a4ddb0f5e933f372808c10b9ac704505751bb1 - Patch
References () https://git.kernel.org/stable/c/2eb7937b5fc7fcd90eab7bebb0181214b61b9283 - () https://git.kernel.org/stable/c/2eb7937b5fc7fcd90eab7bebb0181214b61b9283 - Patch
References () https://git.kernel.org/stable/c/3b53dc1c641f2884d4750fc25aaf6c36b90db606 - () https://git.kernel.org/stable/c/3b53dc1c641f2884d4750fc25aaf6c36b90db606 - Patch
References () https://git.kernel.org/stable/c/41b70df5b38bc80967d2e0ed55cc3c3896bba781 - () https://git.kernel.org/stable/c/41b70df5b38bc80967d2e0ed55cc3c3896bba781 - Patch
References () https://git.kernel.org/stable/c/fe9da1812f8697a38f7e30991d568ec199e16059 - () https://git.kernel.org/stable/c/fe9da1812f8697a38f7e30991d568ec199e16059 - Patch

Information

Published : 2025-09-04 16:15

Updated : 2025-11-25 21:50


NVD link : CVE-2025-38730

Mitre link : CVE-2025-38730

CVE.ORG link : CVE-2025-38730


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write