摘要:
In the Linux kernel, the following vulnerability has been resolved:
io_uring/uring_cmd: unconditionally copy SQEs at prep time
This isn't generally necessary, but conditions have been observed where
SQE data is accessed from the original SQE after prep has been done and
outside of the initial issue. Opcode prep handlers must ensure that any
SQE related data is stable beyond the prep phase, but uring_cmd is a bit
special in how it handles the SQE which makes it susceptible to reading
stale data. If the application has reused the SQE before the original
completes, then that can lead to data corruption.
Down the line we can relax this again once uring_cmd has been sanitized
a bit, and avoid unnecessarily copying the SQE.
安全等级: Low
公告ID: KylinSec-SA-2025-1279
发布日期: 2025年3月9日
关联CVE: CVE-2025-21837
In the Linux kernel, the following vulnerability has been resolved:
io_uring/uring_cmd: unconditionally copy SQEs at prep time
This isn't generally necessary, but conditions have been observed where
SQE data is accessed from the original SQE after prep has been done and
outside of the initial issue. Opcode prep handlers must ensure that any
SQE related data is stable beyond the prep phase, but uring_cmd is a bit
special in how it handles the SQE which makes it susceptible to reading
stale data. If the application has reused the SQE before the original
completes, then that can lead to data corruption.
Down the line we can relax this again once uring_cmd has been sanitized
a bit, and avoid unnecessarily copying the SQE.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2025-21837 | KY3.4-5 | kernel | Unaffected |
CVE-2025-21837 | V6 | kernel | Unaffected |