CVE-2024-46840

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/09/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: clean up our handling of refs == 0 in snapshot delete<br /> <br /> In reada we BUG_ON(refs == 0), which could be unkind since we aren&amp;#39;t<br /> holding a lock on the extent leaf and thus could get a transient<br /> incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which<br /> could happen if we have extent tree corruption. Change that to return<br /> -EUCLEAN. In do_walk_down() we catch this case and handle it correctly,<br /> however we return -EIO, which -EUCLEAN is a more appropriate error code.<br /> Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert<br /> that to proper error handling. Also adjust the error message so we can<br /> actually do something with the information.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.322 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.284 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.226 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.167 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.110 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.51 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.10 (excluding)