Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-35935
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 May, 2024 | 10:10
Updated At-05 Jan, 2026 | 10:35
Rejected At-
▼CVE Numbering Authority (CNA)
btrfs: send: handle path ref underflow in header iterate_inode_ref()

In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/btrfs/send.c
Default Status
unaffected
Versions
Affected
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before be2b6bcc936ae17f42fff6494106a5660b35d8d3 (git)
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before 024529c27c8b4b273325a169e078337c8279e229 (git)
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before 4720d590c4cb5d9ffa0060b89743651cc7e995f9 (git)
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before 2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a (git)
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before 9ae356c627b493323e1433dcb27a26917668c07c (git)
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before c1363ed8867b81ea169fba2ccc14af96a85ed183 (git)
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before 03938619a1e718b6168ae4528e1b0f979293f1a5 (git)
  • From 31db9f7c23fbf7e95026143f79645de6507b583b before 3c6ee34c6f9cd12802326da26631232a61743501 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/btrfs/send.c
Default Status
affected
Versions
Affected
  • 3.6
Unaffected
  • From 0 before 3.6 (semver)
  • From 4.19.312 through 4.19.* (semver)
  • From 5.4.274 through 5.4.* (semver)
  • From 5.10.215 through 5.10.* (semver)
  • From 5.15.155 through 5.15.* (semver)
  • From 6.1.86 through 6.1.* (semver)
  • From 6.6.27 through 6.6.* (semver)
  • From 6.8.6 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3
N/A
https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229
N/A
https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9
N/A
https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a
N/A
https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c
N/A
https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183
N/A
https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5
N/A
https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501
N/A
Hyperlink: https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3
x_transferred
https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229
x_transferred
https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9
x_transferred
https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a
x_transferred
https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c
x_transferred
https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183
x_transferred
https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5
x_transferred
https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
x_transferred
Hyperlink: https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found