Home

Description

In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size could panic kernel easily. Make sure that block size is set correctly. Meantime if ublk_validate_params() fails, clear ub->params so that disk is prevented from being added.

PUBLISHED Reserved 2025-09-16 | Published 2025-09-16 | Updated 2025-09-16 | Assigner Linux

Product status

Default status
unaffected

71f28f3136aff5890cd56de78abc673f8393cad9 (git) before 231a49460ac0203270da2471928d392e5586370f
affected

71f28f3136aff5890cd56de78abc673f8393cad9 (git) before 9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1e
affected

71f28f3136aff5890cd56de78abc673f8393cad9 (git) before 1d1665279a845d16c93687389e364386e3fe0f38
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.1.24 (semver)
unaffected

6.2.11 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/231a49460ac0203270da2471928d392e5586370f

git.kernel.org/...c/9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1e

git.kernel.org/...c/1d1665279a845d16c93687389e364386e3fe0f38

cve.org (CVE-2023-53269)

nvd.nist.gov (CVE-2023-53269)

Download JSON