Description
In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size could panic kernel easily. Make sure that block size is set correctly. Meantime if ublk_validate_params() fails, clear ub->params so that disk is prevented from being added.
Product status
71f28f3136aff5890cd56de78abc673f8393cad9 (git) before 231a49460ac0203270da2471928d392e5586370f
71f28f3136aff5890cd56de78abc673f8393cad9 (git) before 9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1e
71f28f3136aff5890cd56de78abc673f8393cad9 (git) before 1d1665279a845d16c93687389e364386e3fe0f38
6.0
Any version before 6.0
6.1.24 (semver)
6.2.11 (semver)
6.3 (original_commit_for_fix)
References
git.kernel.org/...c/231a49460ac0203270da2471928d392e5586370f
git.kernel.org/...c/9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1e
git.kernel.org/...c/1d1665279a845d16c93687389e364386e3fe0f38