In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
| linux | | https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be apower of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to anull pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and bea power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due toa null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The currentcheck does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref whenloaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]