In the Linux kernel, the following vulnerability has been resolved:
virtiofs: add filesystem context source name check
In certain scenarios, for example, during fuzz testing, the source name may be NULL, which could lead to a kernel panic. Therefore, an extra check for the source name should be added.
[
{
"deprecated": false,
"target": {
"file": "fs/fuse/virtio_fs.c",
"function": "virtio_fs_get_tree"
},
"digest": {
"length": 1413.0,
"function_hash": "226912381920319677412153751441607221223"
},
"id": "CVE-2025-37773-25bdee00",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@599d1e2a6aecc44acf22fe7ea6f5e84a7e526abe",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/fuse/virtio_fs.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"308868277974765853744894109726052663191",
"232747366505503037366605340151448315372",
"281620055021199519822370439197115243129"
]
},
"id": "CVE-2025-37773-88b51169",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@599d1e2a6aecc44acf22fe7ea6f5e84a7e526abe",
"signature_version": "v1"
}
]