PT-2025-9980 · Linux +5 · Linux Kernel +5

Published

2025-01-23

·

Updated

2025-09-03

·

CVE-2025-21832

CVSS v2.0
4.6
VectorAV:L/AC:L/Au:S/C:N/I:N/A:C
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description A issue in the Linux kernel has been resolved, related to the blkdev read iter() function. This function has odd checks, such as gating the position and count adjustment based on the result being bigger-than-or-equal to zero, and not checking the return value of blkdev direct IO() before calling iov iter revert(). The latter can lead to attempting to revert with a negative value, causing a WARN ON() because unroll is bigger than MAX RW COUNT. The fix involves not reverting for -EIOCBQUEUED, similar to other parts of the code.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Unchecked Return Value

Weakness Enumeration

Related Identifiers

BDU:2025-11975
CVE-2025-21832
DLA-4102-1
OESA-2025-1371
OESA-2025-1372
OPENSUSE-SU-2025_1177-1
OPENSUSE-SU-2025_1178-1
OPENSUSE-SU-2025_1180-1
SUSE-SU-2025:01919-1
SUSE-SU-2025:01951-1
SUSE-SU-2025:01967-1
SUSE-SU-2025:1177-1
SUSE-SU-2025:1178-1
SUSE-SU-2025:1180-1
SUSE-SU-2025_01967-1
SUSE-SU-2025_1177-1
SUSE-SU-2025_1178-1
SUSE-SU-2025_1180-1
USN-7521-1
USN-7521-2
USN-7521-3
USN-7651-1
USN-7651-2
USN-7651-3
USN-7651-4
USN-7651-5
USN-7651-6
USN-7652-1
USN-7653-1
USN-7737-1

Affected Products

Astra Linux
Debian
Linuxmint
Linux Kernel
Suse
Ubuntu