We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | Linux |
Reserved | 2024-07-12 |
Published | 2024-07-29 |
Updated | 2024-09-11 |
In the Linux kernel, the following vulnerability has been resolved: null_blk: fix validation of block size Block size should be between 512 and PAGE_SIZE and be a power of 2. The current check does not validate this, so update the check. Without this patch, null_blk would Oops due to a null pointer deref when loaded with bs=1536 [1]. [axboe: remove unnecessary braces and != 0 check]
https://git.kernel.org/stable/c/9625afe1dd4a158a14bb50f81af9e2dac634c0b1
https://git.kernel.org/stable/c/9b873bdaae64bddade9d8c6df23c8a31948d47d0
https://git.kernel.org/stable/c/2772ed2fc075eef7df3789906fc9dae01e4e132e
https://git.kernel.org/stable/c/08f03186b96e25e3154916a2e70732557c770ea7
https://git.kernel.org/stable/c/f92409a9da02f27d05d713bff5f865e386cef9b3
https://git.kernel.org/stable/c/c462ecd659b5fce731f1d592285832fd6ad54053