From this webpage screenshot, the following key vulnerability information can be obtained: Vulnerability Description: - ublk: fix race between io_uring_cmd_complete_in_task and ublk_cancel_cmd - ublk_cancel_cmd() calls cmd_done() to complete uring_cmd, but we may have scheduled task work via io_uring_cmd_complete_in_task() for dispatching request, then kernel crash can be triggered. Fix Measures: - Fix it by not trying to cancel the command if ublk block request is started. Related Commits: - Fixes: 216c8f5ef0f2 ("ublk: replace monitor with cancelable uring_cmd") - Reported-by: Jared Holzman - Tested-by: Jared Holzman - Closes: https://lore.kernel.org/linux-block/d2179120-171b-47ba-b664-23242981ef19@nvidia.com/ Code Changes: - File: drivers/block/ublk_drv.c - Changes: 1 file, 21 insertions, 6 deletions Commit Information: - Author: Ming Lei - Committer: Jens Axboe - Commit ID: f40139fde5278d81af3227444fd6e76a76b9506d - Date: 2025-04-25 09:37:40 +0800 This information indicates a race condition vulnerability related to the ublk module in the Linux kernel, which could lead to a kernel crash. The vulnerability is fixed by avoiding command cancellation when the ublk block request has already started.