We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: btrfs: add the missing error handling inside get_canonical_dev_path Inside function get_canonical_dev_path(), we call d_path() to get the final device path. But d_path() can return error, and in that case the next strscpy() call will trigger an invalid memory access. Add back the missing error handling for d_path().
Reserved 2024-12-29 | Published 2025-01-31 | Updated 2025-01-31 | Assigner Linuxgit.kernel.org/...c/d0fb5741932b831eded49bfaaf33353e96200d6d
git.kernel.org/...c/fe4de594f7a2e9bc49407de60fbd20809fad4192
Support options