In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time This isn't generally necessary, but conditions have been observed where SQE data is accessed from the original SQE after prep has been done and outside of the initial issue. Opcode prep handlers must ensure that any SQE related data is stable beyond the prep phase, but uring_cmd is a bit special in how it handles the SQE which makes it susceptible to reading stale data. If the application has reused the SQE before the original completes, then that can lead to data corruption. Down the line we can relax this again once uring_cmd has been sanitized a bit, and avoid unnecessarily copying the SQE.
History

Sat, 08 Mar 2025 14:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Fri, 07 Mar 2025 09:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time This isn't generally necessary, but conditions have been observed where SQE data is accessed from the original SQE after prep has been done and outside of the initial issue. Opcode prep handlers must ensure that any SQE related data is stable beyond the prep phase, but uring_cmd is a bit special in how it handles the SQE which makes it susceptible to reading stale data. If the application has reused the SQE before the original completes, then that can lead to data corruption. Down the line we can relax this again once uring_cmd has been sanitized a bit, and avoid unnecessarily copying the SQE.
Title io_uring/uring_cmd: unconditionally copy SQEs at prep time
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2025-03-07T09:09:56.827Z

Updated: 2025-03-24T15:41:09.740Z

Reserved: 2024-12-29T08:45:45.777Z

Link: CVE-2025-21837

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-03-07T09:15:16.710

Modified: 2025-03-07T09:15:16.710

Link: CVE-2025-21837

cve-icon Redhat

Severity : Important

Publid Date: 2025-03-07T00:00:00Z

Links: CVE-2025-21837 - Bugzilla