In the Linux kernel, the following vulnerability has been resolved: null_blk: fix validation of block size Block size should be between 512 and PAGE_SIZE and be a power of 2. The current check does not validate this, so update the check. Without this patch, null_blk would Oops due to a null pointer deref when loaded with bs=1536 [1]. [axboe: remove unnecessary braces and != 0 check]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | < 6.1.106-1 | linux_6.1.106-1_all.deb |
Debian | 11 | all | linux | < 5.10.223-1 | linux_5.10.223-1_all.deb |
Debian | 999 | all | linux | < 6.9.11-1 | linux_6.9.11-1_all.deb |
Debian | 13 | all | linux | < 6.9.11-1 | linux_6.9.11-1_all.deb |