First published: Wed Feb 12 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag Truncate an inode's address space when flipping the GFS2_DIF_JDATA flag: depending on that flag, the pages in the address space will either use buffer heads or iomap_folio_state structs, and we cannot mix the two.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <5.4.290 | |
Linux Kernel | >=5.5<5.10.234 | |
Linux Kernel | >=5.11<5.15.178 | |
Linux Kernel | >=5.16<6.1.128 | |
Linux Kernel | >=6.2<6.6.75 | |
Linux Kernel | >=6.7<6.12.12 | |
Linux Kernel | =6.13 | |
Linux Kernel | =6.13-rc1 | |
Linux Kernel | =6.13-rc2 | |
Linux Kernel | =6.13-rc3 | |
Linux Kernel | =6.13-rc4 | |
Linux Kernel | =6.13-rc5 | |
Linux Kernel | =6.13-rc6 | |
Linux Kernel | =6.13-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21699 is categorized as a medium severity vulnerability in the Linux kernel.
To resolve CVE-2025-21699, it is recommended to update to the latest patched version of the Linux kernel.
CVE-2025-21699 can potentially lead to data loss or corruption when using the GFS2 file system.
CVE-2025-21699 affects specific versions of the Linux kernel, so checking the kernel version in use is necessary to determine if it is vulnerable.
Users and administrators running affected versions of the Linux kernel with the GFS2 file system enabled may be impacted by CVE-2025-21699.