In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix overflows checks in provide buffers
Colin reported before possible overflow and sign extension problems in
io_provide_buffers_prep(). As Linus pointed out previous attempt did nothing
useful, see d81269fecb8ce ("io_uring: fix provide_buffers sign extension").
Do that with help of check_<op>_overflow helpers. And fix struct
io_provide_buf::len type, as it doesn't make much sense to keep it
signed.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-28 09:15
Updated : 2025-01-09 15:29
NVD link : CVE-2021-47040
Mitre link : CVE-2021-47040
CVE.ORG link : CVE-2021-47040
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
