This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
History

Tue, 20 May 2025 14:45:00 +0000


Tue, 20 May 2025 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time This isn't generally necessary, but conditions have been observed where SQE data is accessed from the original SQE after prep has been done and outside of the initial issue. Opcode prep handlers must ensure that any SQE related data is stable beyond the prep phase, but uring_cmd is a bit special in how it handles the SQE which makes it susceptible to reading stale data. If the application has reused the SQE before the original completes, then that can lead to data corruption. Down the line we can relax this again once uring_cmd has been sanitized a bit, and avoid unnecessarily copying the SQE. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title io_uring/uring_cmd: unconditionally copy SQEs at prep time kernel: io_uring/uring_cmd: unconditionally copy SQEs at prep time

Wed, 02 Apr 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Important

threat_severity

Moderate


Sat, 08 Mar 2025 14:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Fri, 07 Mar 2025 09:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time This isn't generally necessary, but conditions have been observed where SQE data is accessed from the original SQE after prep has been done and outside of the initial issue. Opcode prep handlers must ensure that any SQE related data is stable beyond the prep phase, but uring_cmd is a bit special in how it handles the SQE which makes it susceptible to reading stale data. If the application has reused the SQE before the original completes, then that can lead to data corruption. Down the line we can relax this again once uring_cmd has been sanitized a bit, and avoid unnecessarily copying the SQE.
Title io_uring/uring_cmd: unconditionally copy SQEs at prep time
References

cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2025-05-20T13:53:34.359Z

Reserved: 2024-12-29T08:45:45.777Z

Link: CVE-2025-21837

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2025-03-07T09:15:16.710

Modified: 2025-05-20T14:15:48.343

Link: CVE-2025-21837

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-03-07T00:00:00Z

Links: CVE-2025-21837 - Bugzilla