{"uuid": "fbde75ea-014a-4166-ad2b-69c3b1d6df89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21832", "type": "seen", "source": "https://t.me/cvedetector/19718", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21832 - Linux Kernel Block Device I/O Reversion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21832 \nPublished : March 6, 2025, 5:15 p.m. | 1\u00a0hour ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nblock: don't revert iter for -EIOCBQUEUED  \n  \nblkdev_read_iter() has a few odd checks, like gating the position and  \ncount adjustment on whether or not the result is bigger-than-or-equal to  \nzero (where bigger than makes more sense), and not checking the return  \nvalue of blkdev_direct_IO() before doing an iov_iter_revert(). The  \nlatter can lead to attempting to revert with a negative value, which  \nwhen passed to iov_iter_revert() as an unsigned value will lead to  \nthrowing a WARN_ON() because unroll is bigger than MAX_RW_COUNT.  \n  \nBe sane and don't revert for -EIOCBQUEUED, like what is done in other  \nspots. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T19:41:35.000000Z"}