Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vh4g-mh2m-pgg3

Опубликовано: 31 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.5

Описание

In the Linux kernel, the following vulnerability has been resolved:

btrfs: add the missing error handling inside get_canonical_dev_path

Inside function get_canonical_dev_path(), we call d_path() to get the final device path.

But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access.

Add back the missing error handling for d_path().

In the Linux kernel, the following vulnerability has been resolved:

btrfs: add the missing error handling inside get_canonical_dev_path

Inside function get_canonical_dev_path(), we call d_path() to get the final device path.

But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access.

Add back the missing error handling for d_path().

EPSS

Процентиль: 5%
0.00023
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().

CVSS3: 5.5
redhat
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().

CVSS3: 5.5
nvd
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().

CVSS3: 5.5
debian
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: b ...

CVSS3: 5.5
fstec
10 месяцев назад

Уязвимость функции get_canonical_dev_path() модуля fs/btrfs/volumes.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании.

EPSS

Процентиль: 5%
0.00023
Низкий

5.5 Medium

CVSS3