Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size could panic kernel easily. Make sure that block size is set correctly. Meantime if ublk_validate_params() fails, clear ub->params so that disk is prevented from being added.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.0, < 6.1.24 |
References
- https://git.kernel.org/stable/c/1d1665279a845d16c93687389e364386e3fe0f38Patch
- https://git.kernel.org/stable/c/231a49460ac0203270da2471928d392e5586370fPatch
- https://git.kernel.org/stable/c/9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1ePatch
FAQ
What is CVE-2023-53269?
CVE-2023-53269 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size cou...
How severe is CVE-2023-53269?
CVE-2023-53269 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53269?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.