In the Linux kernel, the following vulnerability has been resolved:
dm-flakey: Fix memory corruption in optional corruptbiobyte feature
Fix memory corruption due to incorrect parameter being passed to bio_init
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"206111157198289741631755877692819936026",
"51669690505917326231123146094446661320",
"137865252575101671918427673122445095790",
"320960605837177124131997881643362590176"
]
},
"id": "CVE-2025-21966-115ba11e",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@da070843e153471be4297a12fdaa64023276f40e",
"target": {
"file": "drivers/md/dm-flakey.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1592.0,
"function_hash": "228154174934261060272326658347621096203"
},
"id": "CVE-2025-21966-1d51cd51",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57e9417f69839cb10f7ffca684c38acd28ceb57b",
"target": {
"file": "drivers/md/dm-flakey.c",
"function": "clone_bio"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"206111157198289741631755877692819936026",
"51669690505917326231123146094446661320",
"137865252575101671918427673122445095790",
"320960605837177124131997881643362590176"
]
},
"id": "CVE-2025-21966-264fe8b5",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57e9417f69839cb10f7ffca684c38acd28ceb57b",
"target": {
"file": "drivers/md/dm-flakey.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1592.0,
"function_hash": "228154174934261060272326658347621096203"
},
"id": "CVE-2025-21966-c8f18251",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@da070843e153471be4297a12fdaa64023276f40e",
"target": {
"file": "drivers/md/dm-flakey.c",
"function": "clone_bio"
}
}
]