In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix overflows checks in provide buffers
Colin reported before possible overflow and sign extension problems in ioprovidebuffersprep(). As Linus pointed out previous attempt did nothing useful, see d81269fecb8ce ("iouring: fix provide_buffers sign extension").
Do that with help of check<op>overflow helpers. And fix struct ioprovidebuf::len type, as it doesn't make much sense to keep it signed.
[
{
"events": [
{
"introduced": "5.8"
},
{
"fixed": "5.10.37"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.11.21"
}
]
},
{
"events": [
{
"introduced": "5.12"
},
{
"fixed": "5.12.4"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47040.json"