In the Linux kernel, the following vulnerability has been resolved: block: prevent division by zero in blk_rq_stat_sum() The expression dst->nr_samples + src->nr_samples may have zero value on overflow. It is necessary to add a check to avoid division by zero. Found by Linux Verification Center (linuxtesting.org) with Svace.
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://git.kernel.org/stable/c/edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14
https://git.kernel.org/stable/c/b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c
https://git.kernel.org/stable/c/98ddf2604ade2d954bf5ec193600d5274a43fd68
https://git.kernel.org/stable/c/93f52fbeaf4b676b21acfe42a5152620e6770d02
https://git.kernel.org/stable/c/6a55dab4ac956deb23690eedd74e70b892a378e7
https://git.kernel.org/stable/c/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe
https://git.kernel.org/stable/c/512a01da7134bac8f8b373506011e8aaa3283854
https://git.kernel.org/stable/c/21e7d72d0cfcbae6042d498ea2e6f395311767f8