Total vulnerabilities in the database
In the Linux kernel, the following vulnerability has been resolved:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio
If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the following kernel warning appears:
WARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8 Call trace: kiocb_set_cancel_fn+0x9c/0xa8 ffs_epfile_read_iter+0x144/0x1d0 io_read+0x19c/0x498 io_issue_sqe+0x118/0x27c io_submit_sqes+0x25c/0x5fc __arm64_sys_io_uring_enter+0x104/0xab0 invoke_syscall+0x58/0x11c el0_svc_common+0xb4/0xf4 do_el0_svc+0x2c/0xb0 el0_svc+0x2c/0xa4 el0t_64_sync_handler+0x68/0xb4 el0t_64_sync+0x1a4/0x1a8
Fix this by setting the IOCB_AIO_RW flag for read and write I/O that is submitted by libaio.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 6.8-rc1 | 6.8-rc1.x |
linux / linux_kernel | 5.16 | 6.1.80 |
linux / linux_kernel | 5.11 | 5.15.150 |
linux / linux_kernel | 6.8-rc3 | 6.8-rc3.x |
linux / linux_kernel | 6.8-rc4 | 6.8-rc4.x |
linux / linux_kernel | 6.8-rc2 | 6.8-rc2.x |
linux / linux_kernel | - | 4.19.308 |
linux / linux_kernel | 4.20 | 5.4.270 |
linux / linux_kernel | 5.5 | 5.10.211 |
linux / linux_kernel | 6.2 | 6.6.19 |
linux / linux_kernel | 6.7 | 6.7.7 |
linux / linux_kernel | 6.8-rc5 | 6.8-rc5.x |
debian / debian_linux | 10.0 | 10.0.x |