CVE-2025-68294

Source
https://cve.org/CVERecord?id=CVE-2025-68294
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68294.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68294
Downstream
Published
2025-12-16T15:06:14.177Z
Modified
2026-03-09T23:56:31.228200Z
Summary
io_uring/net: ensure vectored buffer node import is tied to notification
Details

In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: ensure vectored buffer node import is tied to notification

When support for vectored registered buffers was added, the import itself is using 'req' rather than the notification iokiocb, sr->notif. For non-vectored imports, sr->notif is correctly used. This is important as the lifetime of the two may be different. Use the correct iokiocb for the vectored buffer import.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68294.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
23371eac7d9a9bca5360cfb3eb3aa08648ee7246
Fixed
14459281e027f23b70885c1cc1032a71c0efd8d7
Fixed
f6041803a831266a2a5a5b5af66f7de0845bcbf3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68294.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.15.0
Fixed
6.17.11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68294.json"