Description
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
References (10)
Scores
CVSS v3
3.3
EPSS
0.0002
EPSS Percentile
5.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-209
Status
published
Products (9)
debian/debian_linux
10.0
linux/Kernel
3.6.0 - 4.19.312linux
linux/Kernel
4.20.0 - 5.4.274linux
linux/Kernel
5.11.0 - 5.15.155linux
linux/Kernel
5.16.0 - 6.1.86linux
linux/Kernel
5.5.0 - 5.10.215linux
linux/Kernel
6.2.0 - 6.6.27linux
linux/Kernel
6.7.0 - 6.8.6linux
linux/linux_kernel
< 4.19.312
Published
May 19, 2024
Tracked Since
Feb 18, 2026