CVE-2024-35936
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/05/2024
Last modified:
17/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()<br />
<br />
The unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,<br />
as it could be caused only by two impossible conditions:<br />
<br />
- at first the search key is set up to look for a chunk tree item, with<br />
offset -1, this is an inexact search and the key->offset will contain<br />
the correct offset upon a successful search, a valid chunk tree item<br />
cannot have an offset -1<br />
<br />
- after first successful search, the found_key corresponds to a chunk<br />
item, the offset is decremented by 1 before the next loop, it&#39;s<br />
impossible to find a chunk item there due to alignment and size<br />
constraints
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.312 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.274 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.215 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.155 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.86 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.27 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.6 (excluding) |
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0d23b34c68c46cd225b55868bc8a269e3134816d
- https://git.kernel.org/stable/c/1f9212cdbd005bc55f2b7422e7b560d9c02bd1da
- https://git.kernel.org/stable/c/36c2a2863bc3896243eb724dc3fd4cf9aea633f2
- https://git.kernel.org/stable/c/576164bd01bd795f8b09fb194b493103506b33c9
- https://git.kernel.org/stable/c/7411055db5ce64f836aaffd422396af0075fdc99
- https://git.kernel.org/stable/c/87299cdaae757f3f41212146cfb5b3af416b8385
- https://git.kernel.org/stable/c/bebd9e0ff90034875c5dfe4bd514fd7055fc7a89
- https://git.kernel.org/stable/c/d1ffa4ae2d591fdd40471074e79954ec45f147f7
- https://git.kernel.org/stable/c/0d23b34c68c46cd225b55868bc8a269e3134816d
- https://git.kernel.org/stable/c/1f9212cdbd005bc55f2b7422e7b560d9c02bd1da
- https://git.kernel.org/stable/c/36c2a2863bc3896243eb724dc3fd4cf9aea633f2
- https://git.kernel.org/stable/c/576164bd01bd795f8b09fb194b493103506b33c9
- https://git.kernel.org/stable/c/7411055db5ce64f836aaffd422396af0075fdc99
- https://git.kernel.org/stable/c/87299cdaae757f3f41212146cfb5b3af416b8385
- https://git.kernel.org/stable/c/bebd9e0ff90034875c5dfe4bd514fd7055fc7a89
- https://git.kernel.org/stable/c/d1ffa4ae2d591fdd40471074e79954ec45f147f7
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html



