Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.12.5, < 6.12.11 |
References
- https://git.kernel.org/stable/c/d0fb5741932b831eded49bfaaf33353e96200d6dPatch
- https://git.kernel.org/stable/c/fe4de594f7a2e9bc49407de60fbd20809fad4192Patch
FAQ
What is CVE-2025-21679?
CVE-2025-21679 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to ...
How severe is CVE-2025-21679?
CVE-2025-21679 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-21679?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.