CVE-2025-21699

In the Linux kernel, the following vulnerability has been resolved: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag Truncate an inode's address space when flipping the GFS2_DIF_JDATA flag: depending on that flag, the pages in the address space will either use buffer heads or iomap_folio_state structs, and we cannot mix the two.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*

History

14 Feb 2025, 14:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gfs2: Trunca el espacio de direcciones al invertir el indicador GFS2_DIF_JDATA Trunca el espacio de direcciones de un inodo al invertir el indicador GFS2_DIF_JDATA: dependiendo de ese indicador, las páginas en el espacio de direcciones usarán encabezados de búfer o estructuras iomap_folio_state, y no podemos mezclar los dos.
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/2a40a140e11fec699e128170ccaa98b6b82cb503 - () https://git.kernel.org/stable/c/2a40a140e11fec699e128170ccaa98b6b82cb503 - Patch
References () https://git.kernel.org/stable/c/2b0bd5051ad1c1e9ef4879f18e15a7712c974f3e - () https://git.kernel.org/stable/c/2b0bd5051ad1c1e9ef4879f18e15a7712c974f3e - Patch
References () https://git.kernel.org/stable/c/4516febe325342555bb09ca5b396fb816d655821 - () https://git.kernel.org/stable/c/4516febe325342555bb09ca5b396fb816d655821 - Patch
References () https://git.kernel.org/stable/c/4dd57d1f0e9844311c635a7fb39abce4f2ac5a61 - () https://git.kernel.org/stable/c/4dd57d1f0e9844311c635a7fb39abce4f2ac5a61 - Patch
References () https://git.kernel.org/stable/c/4e3ded34f3f3c9d7ed2aac7be8cf51153646574a - () https://git.kernel.org/stable/c/4e3ded34f3f3c9d7ed2aac7be8cf51153646574a - Patch
References () https://git.kernel.org/stable/c/5bb1fd0855bb0abc7d97e44758d6ffed7882d2d0 - () https://git.kernel.org/stable/c/5bb1fd0855bb0abc7d97e44758d6ffed7882d2d0 - Patch
References () https://git.kernel.org/stable/c/7c9d9223802fbed4dee1ae301661bf346964c9d2 - () https://git.kernel.org/stable/c/7c9d9223802fbed4dee1ae301661bf346964c9d2 - Patch
References () https://git.kernel.org/stable/c/8c41abc11aa8438c9ed2d973f97e66674c0355df - () https://git.kernel.org/stable/c/8c41abc11aa8438c9ed2d973f97e66674c0355df - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*

12 Feb 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-12 14:15

Updated : 2025-02-14 14:06


NVD link : CVE-2025-21699

Mitre link : CVE-2025-21699

CVE.ORG link : CVE-2025-21699


JSON object : View

Products Affected

linux

  • linux_kernel