Bug 2344685 (CVE-2025-21686) - CVE-2025-21686 kernel: io_uring/rsrc: require cloned buffers to share accounting contexts
Summary: CVE-2025-21686 kernel: io_uring/rsrc: require cloned buffers to share account...
Keywords:
Status: NEW
Alias: CVE-2025-21686
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-10 17:01 UTC by OSIDB Bzimport
Modified: 2025-06-18 08:35 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-10 17:01:18 UTC
In the Linux kernel, the following vulnerability has been resolved:

io_uring/rsrc: require cloned buffers to share accounting contexts

When IORING_REGISTER_CLONE_BUFFERS is used to clone buffers from uring
instance A to uring instance B, where A and B use different MMs for
accounting, the accounting can go wrong:
If uring instance A is closed before uring instance B, the pinned memory
counters for uring instance B will be decremented, even though the pinned
memory was originally accounted through uring instance A; so the MM of
uring instance B can end up with negative locked memory.

Comment 4 TEJ RATHI 2025-05-29 07:10:57 UTC
This CVE has been rejected by the Linux kernel community. Refer to the announcement: https://lore.kernel.org/linux-cve-announce/2025052034-REJECTED-3a7c@gregkh/

Comment added by: Automated Script


Note You need to log in before you can comment on or make changes to this bug.