HomeDefault status
unaffected
b6c1c5745ccc68ac5d57c7ffb51ea25a86d0e97b (git) before cb1f5b76e39d86c98722696bdf632987aa777b83
affected
b6c1c5745ccc68ac5d57c7ffb51ea25a86d0e97b (git) before 916ef6232cc4b84db7082b4c3d3cf1753d9462ba
affected
Default status
affected
6.0
affected
Any version before 6.0
unaffected
6.0.3 (semver)
unaffected
6.1 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: dm: verity-loadpin: Only trust verity targets with enforcement Verity targets can be configured to ignore corrupted data blocks. LoadPin must only trust verity targets that are configured to perform some kind of enforcement when data corruption is detected, like returning an error, restarting the system or triggering a panic.
Product status
b6c1c5745ccc68ac5d57c7ffb51ea25a86d0e97b (git) before cb1f5b76e39d86c98722696bdf632987aa777b83
b6c1c5745ccc68ac5d57c7ffb51ea25a86d0e97b (git) before 916ef6232cc4b84db7082b4c3d3cf1753d9462ba
6.0
Any version before 6.0
6.0.3 (semver)
6.1 (original_commit_for_fix)
References
git.kernel.org/...c/cb1f5b76e39d86c98722696bdf632987aa777b83
git.kernel.org/...c/916ef6232cc4b84db7082b4c3d3cf1753d9462ba