Bug 2393191 (CVE-2025-38730) - CVE-2025-38730 kernel: Linux kernel: Data corruption and system instability due to improper io_uring/net buffer handling
Summary: CVE-2025-38730 kernel: Linux kernel: Data corruption and system instability d...
Keywords:
Status: NEW
Alias: CVE-2025-38730
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-04 16:04 UTC by OSIDB Bzimport
Modified: 2026-02-09 09:31 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:2212 0 None None None 2026-02-09 02:13:15 UTC
Red Hat Product Errata RHSA-2026:2282 0 None None None 2026-02-09 09:31:56 UTC

Description OSIDB Bzimport 2025-09-04 16:04:05 UTC
In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: commit partial buffers on retry

Ring provided buffers are potentially only valid within the single
execution context in which they were acquired. io_uring deals with this
and invalidates them on retry. But on the networking side, if
MSG_WAITALL is set, or if the socket is of the streaming type and too
little was processed, then it will hang on to the buffer rather than
recycle or commit it. This is problematic for two reasons:

1) If someone unregisters the provided buffer ring before a later retry,
   then the req->buf_list will no longer be valid.

2) If multiple sockers are using the same buffer group, then multiple
   receives can consume the same memory. This can cause data corruption
   in the application, as either receive could land in the same
   userspace buffer.

Fix this by disallowing partial retries from pinning a provided buffer
across multiple executions, if ring provided buffers are used.

Comment 6 errata-xmlrpc 2026-02-09 02:13:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2212 https://access.redhat.com/errata/RHSA-2026:2212

Comment 7 errata-xmlrpc 2026-02-09 09:31:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:2282 https://access.redhat.com/errata/RHSA-2026:2282


Note You need to log in before you can comment on or make changes to this bug.