Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-21699
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-12 Feb, 2025 | 13:52
Updated At-02 Jan, 2026 | 15:28
Rejected At-
▼CVE Numbering Authority (CNA)
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag

In the Linux kernel, the following vulnerability has been resolved: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag Truncate an inode's address space when flipping the GFS2_DIF_JDATA flag: depending on that flag, the pages in the address space will either use buffer heads or iomap_folio_state structs, and we cannot mix the two.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/gfs2/file.c
Default Status
unaffected
Versions
Affected
  • From 2164f9b9186962ffb7c687e18ec6f5255525f09d before 8c41abc11aa8438c9ed2d973f97e66674c0355df (git)
  • From 2164f9b9186962ffb7c687e18ec6f5255525f09d before 4e3ded34f3f3c9d7ed2aac7be8cf51153646574a (git)
  • From 2164f9b9186962ffb7c687e18ec6f5255525f09d before 2a40a140e11fec699e128170ccaa98b6b82cb503 (git)
  • From 2164f9b9186962ffb7c687e18ec6f5255525f09d before 4dd57d1f0e9844311c635a7fb39abce4f2ac5a61 (git)
  • From 2164f9b9186962ffb7c687e18ec6f5255525f09d before 4516febe325342555bb09ca5b396fb816d655821 (git)
  • From 2164f9b9186962ffb7c687e18ec6f5255525f09d before 5bb1fd0855bb0abc7d97e44758d6ffed7882d2d0 (git)
  • From 2164f9b9186962ffb7c687e18ec6f5255525f09d before 7c9d9223802fbed4dee1ae301661bf346964c9d2 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/gfs2/file.c
Default Status
affected
Versions
Affected
  • 5.10
Unaffected
  • From 0 before 5.10 (semver)
  • From 5.10.234 through 5.10.* (semver)
  • From 5.15.178 through 5.15.* (semver)
  • From 6.1.128 through 6.1.* (semver)
  • From 6.6.75 through 6.6.* (semver)
  • From 6.12.12 through 6.12.* (semver)
  • From 6.13.1 through 6.13.* (semver)
  • From 6.14 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/8c41abc11aa8438c9ed2d973f97e66674c0355df
N/A
https://git.kernel.org/stable/c/4e3ded34f3f3c9d7ed2aac7be8cf51153646574a
N/A
https://git.kernel.org/stable/c/2a40a140e11fec699e128170ccaa98b6b82cb503
N/A
https://git.kernel.org/stable/c/4dd57d1f0e9844311c635a7fb39abce4f2ac5a61
N/A
https://git.kernel.org/stable/c/4516febe325342555bb09ca5b396fb816d655821
N/A
https://git.kernel.org/stable/c/5bb1fd0855bb0abc7d97e44758d6ffed7882d2d0
N/A
https://git.kernel.org/stable/c/7c9d9223802fbed4dee1ae301661bf346964c9d2
N/A
Hyperlink: https://git.kernel.org/stable/c/8c41abc11aa8438c9ed2d973f97e66674c0355df
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4e3ded34f3f3c9d7ed2aac7be8cf51153646574a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2a40a140e11fec699e128170ccaa98b6b82cb503
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4dd57d1f0e9844311c635a7fb39abce4f2ac5a61
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4516febe325342555bb09ca5b396fb816d655821
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5bb1fd0855bb0abc7d97e44758d6ffed7882d2d0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7c9d9223802fbed4dee1ae301661bf346964c9d2
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
Resource: N/A
Details not found