In the Linux kernel, the following vulnerability has been resolved:
io_uring/rsrc: require cloned buffers to share accounting contexts
When IORING_REGISTER_CLONE_BUFFERS is used to clone buffers from uring
instance A to uring instance B, where A and B use different MMs for
accounting, the accounting can go wrong:
If uring instance A is closed before uring instance B, the pinned memory
counters for uring instance B will be decremented, even though the pinned
memory was originally accounted through uring instance A; so the MM of
uring instance B can end up with negative locked memory.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 10 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: require cloned buffers to share accounting contexts When IORING_REGISTER_CLONE_BUFFERS is used to clone buffers from uring instance A to uring instance B, where A and B use different MMs for accounting, the accounting can go wrong: If uring instance A is closed before uring instance B, the pinned memory counters for uring instance B will be decremented, even though the pinned memory was originally accounted through uring instance A; so the MM of uring instance B can end up with negative locked memory. | |
Title | io_uring/rsrc: require cloned buffers to share accounting contexts | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-10T15:58:43.005Z
Updated: 2025-03-24T15:38:53.245Z
Reserved: 2024-12-29T08:45:45.740Z
Link: CVE-2025-21686

No data.

Status : Received
Published: 2025-02-10T16:15:38.100
Modified: 2025-02-10T16:15:38.100
Link: CVE-2025-21686
