First published: Fri Jan 31 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-21679 is classified as moderate based on its impact on system functions.
To fix CVE-2025-21679, ensure that you have the latest patches or updates applied to the Linux kernel.
CVE-2025-21679 affects multiple versions of the Linux kernel that are prior to the patch release.
CVE-2025-21679 primarily impacts the btrfs file system functionality related to device path resolution.
CVE-2025-21679 is not specifically noted for being exploitable in remote attacks but may allow local code execution under certain conditions.