{"id":"CVE-2025-21699","summary":"gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Truncate address space when flipping GFS2_DIF_JDATA flag\n\nTruncate an inode's address space when flipping the GFS2_DIF_JDATA flag:\ndepending on that flag, the pages in the address space will either use\nbuffer heads or iomap_folio_state structs, and we cannot mix the two.","modified":"2026-04-02T12:45:11.742563Z","published":"2025-02-12T13:52:50.962Z","related":["MGASA-2025-0078","MGASA-2025-0079","SUSE-SU-2025:0784-1","SUSE-SU-2025:0833-1","SUSE-SU-2025:0833-2","SUSE-SU-2025:0835-1","SUSE-SU-2025:0847-1","SUSE-SU-2025:0853-1","SUSE-SU-2025:0855-1","SUSE-SU-2025:0856-1","SUSE-SU-2025:0867-1","SUSE-SU-2025:0945-1","SUSE-SU-2025:0955-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21699.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2a40a140e11fec699e128170ccaa98b6b82cb503"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4516febe325342555bb09ca5b396fb816d655821"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4dd57d1f0e9844311c635a7fb39abce4f2ac5a61"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e3ded34f3f3c9d7ed2aac7be8cf51153646574a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5bb1fd0855bb0abc7d97e44758d6ffed7882d2d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c9d9223802fbed4dee1ae301661bf346964c9d2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c41abc11aa8438c9ed2d973f97e66674c0355df"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21699.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21699"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2164f9b9186962ffb7c687e18ec6f5255525f09d"},{"fixed":"8c41abc11aa8438c9ed2d973f97e66674c0355df"},{"fixed":"4e3ded34f3f3c9d7ed2aac7be8cf51153646574a"},{"fixed":"2a40a140e11fec699e128170ccaa98b6b82cb503"},{"fixed":"4dd57d1f0e9844311c635a7fb39abce4f2ac5a61"},{"fixed":"4516febe325342555bb09ca5b396fb816d655821"},{"fixed":"5bb1fd0855bb0abc7d97e44758d6ffed7882d2d0"},{"fixed":"7c9d9223802fbed4dee1ae301661bf346964c9d2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21699.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}