Количество 20
Количество 20
GHSA-44xq-wgcc-3jwh
In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information.
CVE-2024-46840
In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information.
CVE-2024-46840
In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information.
CVE-2024-46840
In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information.
CVE-2024-46840
btrfs: clean up our handling of refs == 0 in snapshot delete
CVE-2024-46840
In the Linux kernel, the following vulnerability has been resolved: b ...
BDU:2025-01654
Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20250210-01
Множественные уязвимости kernel-lt
ELSA-2024-12813
ELSA-2024-12813: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-12868
ELSA-2024-12868: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:0034-1
Security update for the Linux Kernel
SUSE-SU-2024:4100-1
Security update for the Linux Kernel
SUSE-SU-2024:3983-1
Security update for the Linux Kernel
SUSE-SU-2024:3985-1
Security update for the Linux Kernel
ELSA-2024-12815
ELSA-2024-12815: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2024:3986-1
Security update for the Linux Kernel
SUSE-SU-2024:3984-1
Security update for the Linux Kernel
SUSE-SU-2024:4364-1
Security update for the Linux Kernel
SUSE-SU-2024:4387-1
Security update for the Linux Kernel
SUSE-SU-2024:4318-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-44xq-wgcc-3jwh In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46840 In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46840 In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46840 In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In do_walk_down() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46840 btrfs: clean up our handling of refs == 0 in snapshot delete | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46840 In the Linux kernel, the following vulnerability has been resolved: b ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
BDU:2025-01654 Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
ROS-20250210-01 Множественные уязвимости kernel-lt | CVSS3: 8.8 | 9 месяцев назад | ||
ELSA-2024-12813 ELSA-2024-12813: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12868 ELSA-2024-12868: Unbreakable Enterprise kernel security update (IMPORTANT) | 12 месяцев назад | |||
SUSE-SU-2025:0034-1 Security update for the Linux Kernel | 10 месяцев назад | |||
SUSE-SU-2024:4100-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2024:3983-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3985-1 Security update for the Linux Kernel | около 1 года назад | |||
ELSA-2024-12815 ELSA-2024-12815: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 года назад | |||
SUSE-SU-2024:3986-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3984-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:4364-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4387-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4318-1 Security update for the Linux Kernel | 11 месяцев назад |
Уязвимостей на страницу