In the Linux kernel, the following vulnerability has been resolved:
dm-stripe: fix a possible integer overflow
There's a possible integer overflow in stripe_io_hints if we have too large chunk size. Test if the overflow happened, and if it did, don't set limits->io_min and limits->io_opt;
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 2.6.31.1 | 6.12.49 |
| linux / linux_kernel | 6.13 | 6.16.9 |
| linux / linux_kernel | 2.6.31 | 2.6.31.x |
| linux / linux_kernel | 2.6.31-rc9 | 2.6.31-rc9.x |
| linux / linux_kernel | 6.17-rc1 | 6.17-rc1.x |
| linux / linux_kernel | 6.17-rc2 | 6.17-rc2.x |
| linux / linux_kernel | 6.17-rc3 | 6.17-rc3.x |
| linux / linux_kernel | 6.17-rc4 | 6.17-rc4.x |
| linux / linux_kernel | 6.17-rc5 | 6.17-rc5.x |
| linux / linux_kernel | 6.17-rc6 | 6.17-rc6.x |