Description
In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix overshooting recv limit It's reported that sometimes a zcrx request can receive more than was requested. It's caused by io_zcrx_recv_skb() adjusting desc->count for all received buffers including frag lists, but then doing recursive calls to process frag list skbs, which leads to desc->count double accounting and underflow.
Product status
6699ec9a23f85f1764183430209c741847c45f12 (git) before 8bcc9eaf1b19f1a7029cba19f6bd4122b40f6c4f
6699ec9a23f85f1764183430209c741847c45f12 (git) before 09cfd3c52ea76f43b3cb15e570aeddf633d65e80
6.15
Any version before 6.15
6.17.3 (semver)
6.18-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/8bcc9eaf1b19f1a7029cba19f6bd4122b40f6c4f
git.kernel.org/...c/09cfd3c52ea76f43b3cb15e570aeddf633d65e80