{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:04:50.818","vulnerabilities":[{"cve":{"id":"CVE-2025-68294","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-16T16:16:08.303","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/net: ensure vectored buffer node import is tied to notification\n\nWhen support for vectored registered buffers was added, the import\nitself is using 'req' rather than the notification io_kiocb, sr->notif.\nFor non-vectored imports, sr->notif is correctly used. This is important\nas the lifetime of the two may be different. Use the correct io_kiocb\nfor the vectored buffer import."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/14459281e027f23b70885c1cc1032a71c0efd8d7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f6041803a831266a2a5a5b5af66f7de0845bcbf3","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}