HomeDefault status
unaffected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before f8f64254bca5ae58f3b679441962bda4c409f659
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ee27658c239b27721397f3e4eb16370b5cce596e
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1071d560afb4c245c2076494226df47db5a35708
affected
Default status
affected
6.12.49 (semver)
unaffected
6.16.9 (semver)
unaffected
6.17 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: dm-stripe: fix a possible integer overflow There's a possible integer overflow in stripe_io_hints if we have too large chunk size. Test if the overflow happened, and if it did, don't set limits->io_min and limits->io_opt;
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before f8f64254bca5ae58f3b679441962bda4c409f659
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ee27658c239b27721397f3e4eb16370b5cce596e
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1071d560afb4c245c2076494226df47db5a35708
6.12.49 (semver)
6.16.9 (semver)
6.17 (original_commit_for_fix)
References
git.kernel.org/...c/f8f64254bca5ae58f3b679441962bda4c409f659
git.kernel.org/...c/ee27658c239b27721397f3e4eb16370b5cce596e
git.kernel.org/...c/1071d560afb4c245c2076494226df47db5a35708