CVE-2025-39963Missing Release of Memory after Effective Lifetime in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 98.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring: fix incorrect io_kiocb reference in io_link_skb In io_link_skb function, there is a bug where prev_notif is incorrectly assigned using 'nd' instead of 'prev_nd'. This causes the context validation check to compare the current notification with itself instead of comparing it with the previous notification. Fix by using the correct prev_nd parameter when obtaining prev_notif.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.106.12.49+2
Debianlinux/linux_kernel< 6.12.57-1+1
CVEListV5linux/linux6fe4220912d19152a26ce19713ab232f4263018da89c34babc2e5834aa0905278f26f4dbe4b26b76+3
debiandebian/linux< linux 6.16.9-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-39963: In the Linux kernel, the following vulnerability has been resolved: io_uring: fix incorrect io_kiocb reference in io_link_skb In io_link_skb function,2025-10-09
GHSA
GHSA-w6f6-h6gc-qpjj: In the Linux kernel, the following vulnerability has been resolved: io_uring: fix incorrect io_kiocb reference in io_link_skb In io_link_skb functio2025-10-09

📋Vendor Advisories

2
Red Hat
kernel: io_uring: fix incorrect io_kiocb reference in io_link_skb2025-10-09
Debian
CVE-2025-39963: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring: f...2025