Описание
In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: handle path ref underflow in header iterate_inode_ref()
Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: handle path ref underflow in header iterate_inode_ref()
Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-35935
- https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229
- https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5
- https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a
- https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501
- https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9
- https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c
- https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3
- https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
In the Linux kernel, the following vulnerability has been resolved: b ...
Уязвимость компонента send ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS