Количество 72
Количество 72
CVE-2024-35949
In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately, and ...
CVE-2024-35949
In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately, and ...
CVE-2024-35949
In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately, an
CVE-2024-35949
btrfs: make sure that WRITTEN is set on all metadata blocks
CVE-2024-35949
In the Linux kernel, the following vulnerability has been resolved: b ...
GHSA-3cw9-m9j6-m7jf
In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately,...
BDU:2025-11444
Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2024:4261-1
Security update for the Linux Kernel (Live Patch 50 for SLE 12 SP5)
SUSE-SU-2024:4239-1
Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5)
SUSE-SU-2024:4195-1
Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5)
SUSE-SU-2024:4170-1
Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5)
SUSE-SU-2024:4219-1
Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)
SUSE-SU-2024:4217-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)
SUSE-SU-2024:4129-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)
SUSE-SU-2024:4227-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)
SUSE-SU-2024:4220-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)
SUSE-SU-2024:4206-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
SUSE-SU-2024:4141-1
Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)
SUSE-SU-2024:4120-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)
SUSE-SU-2025:0089-1
Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-35949 In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately, and ... | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-35949 In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately, and ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-35949 In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately, an | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-35949 btrfs: make sure that WRITTEN is set on all metadata blocks | 0% Низкий | около 2 месяцев назад | ||
CVE-2024-35949 In the Linux kernel, the following vulnerability has been resolved: b ... | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
GHSA-3cw9-m9j6-m7jf In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately,... | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
BDU:2025-11444 Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:4261-1 Security update for the Linux Kernel (Live Patch 50 for SLE 12 SP5) | около 1 года назад | |||
SUSE-SU-2024:4239-1 Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5) | около 1 года назад | |||
SUSE-SU-2024:4195-1 Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) | около 1 года назад | |||
SUSE-SU-2024:4170-1 Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) | около 1 года назад | |||
SUSE-SU-2024:4219-1 Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | около 1 года назад | |||
SUSE-SU-2024:4217-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | около 1 года назад | |||
SUSE-SU-2024:4129-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | около 1 года назад | |||
SUSE-SU-2024:4227-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | около 1 года назад | |||
SUSE-SU-2024:4220-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) | около 1 года назад | |||
SUSE-SU-2024:4206-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | около 1 года назад | |||
SUSE-SU-2024:4141-1 Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) | около 1 года назад | |||
SUSE-SU-2024:4120-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | около 1 года назад | |||
SUSE-SU-2025:0089-1 Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | около 1 года назад |
Уязвимостей на страницу