-
CVE-2023-53269
- EPSS 0.02%
- Published 16.09.2025 08:06:58
- Last modified 16.09.2025 12:49:16
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size could panic kernel easily. Make sure that block size is set correctly. Meantime if ublk_validate_params() fails, clear ub->params so that disk is prevented from being added.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
231a49460ac0203270da2471928d392e5586370f
Version
71f28f3136aff5890cd56de78abc673f8393cad9
Status
affected
Version <
9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1e
Version
71f28f3136aff5890cd56de78abc673f8393cad9
Status
affected
Version <
1d1665279a845d16c93687389e364386e3fe0f38
Version
71f28f3136aff5890cd56de78abc673f8393cad9
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.0
Status
affected
Version <
6.0
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.24
Status
unaffected
Version <=
6.2.*
Version
6.2.11
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.043 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|