CVE-2023-53269Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size could panic kernel easily. Make sure that block size is set correctly. Meantime if ublk_validate_params() fails, clear ub->params so that disk is prevented from being added.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.06.1.24+2
Debianlinux/linux_kernel< 6.1.25-1+2
CVEListV5linux/linux71f28f3136aff5890cd56de78abc673f8393cad9231a49460ac0203270da2471928d392e5586370f+3
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q6pc-2x62-x53v: In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very k2025-09-16
OSV
CVE-2023-53269: In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: block: ublk: make sure that block size is set correctly2025-09-16
Debian
CVE-2023-53269: linux - In the Linux kernel, the following vulnerability has been resolved: block: ublk...2023
CVE-2023-53269 — Linux vulnerability | cvebase