CVE-2025-38730
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's io_uring networking code involves improper handling of ring provided buffers during retries. Specifically, when MSG_WAITALL is set or a streaming socket processes too little data, the buffer is held rather than recycled or committed. This can lead to invalid buffer references if the buffer ring is unregistered before a retry, or data corruption if multiple sockets share the same buffer group and receive data into the same userspace buffer. The fix prevents partial retries from pinning a provided buffer across multiple executions.
How can this vulnerability impact me? :
This vulnerability can cause data corruption in applications using io_uring with networking, as multiple receives might write into the same userspace buffer. It can also lead to invalid memory references if buffers are unregistered prematurely, potentially causing application instability or crashes.