Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vh4g-mh2m-pgg3

Опубликовано: 31 янв. 2025
Источник: github
Github: Не прошло ревью

Описание

In the Linux kernel, the following vulnerability has been resolved:

btrfs: add the missing error handling inside get_canonical_dev_path

Inside function get_canonical_dev_path(), we call d_path() to get the final device path.

But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access.

Add back the missing error handling for d_path().

In the Linux kernel, the following vulnerability has been resolved:

btrfs: add the missing error handling inside get_canonical_dev_path

Inside function get_canonical_dev_path(), we call d_path() to get the final device path.

But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access.

Add back the missing error handling for d_path().

EPSS

Процентиль: 3%
0.00019
Низкий

Связанные уязвимости

ubuntu
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().

CVSS3: 5.5
redhat
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().

nvd
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().

debian
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: b ...

CVSS3: 5.5
fstec
6 месяцев назад

Уязвимость функции get_canonical_dev_path() модуля fs/btrfs/volumes.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании.

EPSS

Процентиль: 3%
0.00019
Низкий