Description
In the Linux kernel, the following vulnerability has been resolved: dm-stripe: fix a possible integer overflow There's a possible integer overflow in stripe_io_hints if we have too large chunk size. Test if the overflow happened, and if it did, don't set limits->io_min and limits->io_opt;
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f8f64254bca5ae58f3b679441962bda4c409f659
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ee27658c239b27721397f3e4eb16370b5cce596e
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1071d560afb4c245c2076494226df47db5a35708
6.12.49
6.16.9
6.17
References
git.kernel.org/...c/f8f64254bca5ae58f3b679441962bda4c409f659
git.kernel.org/...c/ee27658c239b27721397f3e4eb16370b5cce596e
git.kernel.org/...c/1071d560afb4c245c2076494226df47db5a35708