CVE-2025-39698

MEDIUM

Linux Kernel < 6.12.44 - Use After Free

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring/futex: ensure io_futex_wait() cleans up properly on failure The io_futex_data is allocated upfront and assigned to the io_kiocb async_data field, but the request isn't marked with REQ_F_ASYNC_DATA at that point. Those two should always go together, as the flag tells io_uring whether the field is valid or not. Additionally, on failure cleanup, the futex handler frees the data but does not clear ->async_data. Clear the data and the flag in the error path as well. Thanks to Trend Micro Zero Day Initiative and particularly ReDress for reporting this.

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 5.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-416 CWE-672
Status published
Products (4)
linux/Kernel 6.13.0 - 6.16.4linux
linux/Kernel 6.7.0 - 6.12.44linux
linux/linux_kernel 6.17 rc1 (2 CPE variants)
linux/linux_kernel 6.7 - 6.12.44
Published Sep 05, 2025
Tracked Since Feb 18, 2026