In the Linux kernel, the following vulnerability has been resolved:
block: don't revert iter for -EIOCBQUEUED
blkdevreaditer() has a few odd checks, like gating the position and count adjustment on whether or not the result is bigger-than-or-equal to zero (where bigger than makes more sense), and not checking the return value of blkdevdirectIO() before doing an ioviterrevert(). The latter can lead to attempting to revert with a negative value, which when passed to ioviterrevert() as an unsigned value will lead to throwing a WARNON() because unroll is bigger than MAXRW_COUNT.
Be sane and don't revert for -EIOCBQUEUED, like what is done in other spots.
[
{
"target": {
"function": "blkdev_read_iter",
"file": "block/fops.c"
},
"digest": {
"length": 901.0,
"function_hash": "209907604120464120299096435676637184399"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a58f136bad29f9ae721a29d98c042fddbee22f77",
"deprecated": false,
"id": "CVE-2025-21832-06f57ba5",
"signature_type": "Function"
},
{
"target": {
"file": "block/fops.c"
},
"digest": {
"line_hashes": [
"220116910182885008690708966539592420349",
"251416972968307620618896990175359323568",
"100898920749161923639967958184365982075",
"93611072068862952535821670042752450379",
"214568433963129806212390100940990944614",
"151133172842946485320013843212344251606",
"279521637135217820082926644213836808659",
"144369413525957222417555008620064455116"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c26619effb1b4cb7d20b4e666ab8f71f6a53ccb",
"deprecated": false,
"id": "CVE-2025-21832-243f1e2b",
"signature_type": "Line"
},
{
"target": {
"file": "block/fops.c"
},
"digest": {
"line_hashes": [
"156795237018811807016511869252808017544",
"251416972968307620618896990175359323568",
"100898920749161923639967958184365982075",
"93611072068862952535821670042752450379",
"214568433963129806212390100940990944614",
"151133172842946485320013843212344251606",
"279521637135217820082926644213836808659",
"144369413525957222417555008620064455116"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a58f136bad29f9ae721a29d98c042fddbee22f77",
"deprecated": false,
"id": "CVE-2025-21832-6e8b265a",
"signature_type": "Line"
},
{
"target": {
"function": "blkdev_read_iter",
"file": "block/fops.c"
},
"digest": {
"length": 1078.0,
"function_hash": "18222500423858482046600512734725627610"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c26619effb1b4cb7d20b4e666ab8f71f6a53ccb",
"deprecated": false,
"id": "CVE-2025-21832-f46a23ce",
"signature_type": "Function"
}
]