CVE-2023-53269

In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size could panic kernel easily. Make sure that block size is set correctly. Meantime if ublk_validate_params() fails, clear ub->params so that disk is prevented from being added.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*

History

03 Dec 2025, 16:56

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1d1665279a845d16c93687389e364386e3fe0f38 - () https://git.kernel.org/stable/c/1d1665279a845d16c93687389e364386e3fe0f38 - Patch
References () https://git.kernel.org/stable/c/231a49460ac0203270da2471928d392e5586370f - () https://git.kernel.org/stable/c/231a49460ac0203270da2471928d392e5586370f - Patch
References () https://git.kernel.org/stable/c/9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1e - () https://git.kernel.org/stable/c/9dbe85ac618ef6ae60abe5dd17ae2b29065d9c1e - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2025-09-16 08:15

Updated : 2025-12-03 16:56


NVD link : CVE-2023-53269

Mitre link : CVE-2023-53269

CVE.ORG link : CVE-2023-53269


JSON object : View

Products Affected

linux

  • linux_kernel