Memory Overflow Risk in Linux Kernel Affects Key Functionality
CVE-2025-39793

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
12 September 2025

What is CVE-2025-39793?

A vulnerability in the Linux kernel's io_uring may lead to a memory overflow if the number of pages allocated exceeds the maximum size. When casting the number of pages (nr_pages) for certain operations, the lack of proper type casting can potentially allow for this value to overflow, especially under conditions where root is utilized, bypassing normal validation checks. While typical memory usage patterns won't usually reach problematic size limits, scenarios involving elevated privileges could expose systems to unexpected behavior. It's crucial for administrators to stay informed on this issue and apply relevant updates to mitigate risks.

Affected Version(s)

Linux 087f997870a948820ec366701d178f402c6a23a3

Linux 087f997870a948820ec366701d178f402c6a23a3

Linux 087f997870a948820ec366701d178f402c6a23a3 < 33503c083fda048c77903460ac0429e1e2c0e341

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-39793 : Memory Overflow Risk in Linux Kernel Affects Key Functionality