Description
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix uninitialized pointer free in add_inode_ref() The add_inode_ref() function does not initialize the "name" struct when it is declared. If any of the following calls to "read_one_inode() returns NULL, dir = read_one_inode(root, parent_objectid); if (!dir) { ret = -ENOENT; goto out; } inode = read_one_inode(root, inode_objectid); if (!inode) { ret = -EIO; goto out; } then "name.name" would be freed on "out" before being initialized. out: ... kfree(name.name); This issue was reported by Coverity with CID 1526744.
References (5)
Scores
CVSS v3
7.8
EPSS
0.0003
EPSS Percentile
8.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-824
Status
published
Products (4)
linux/Kernel
< 6.1.114linux
linux/Kernel
6.2.0 - 6.11.5linux
linux/linux_kernel
6.12 rc1 (3 CPE variants)
linux/linux_kernel
6.1.57 - 6.1.114
Published
Oct 29, 2024
Tracked Since
Feb 18, 2026