3.3
CVE-2024-35935
- EPSS 0.02%
- Veröffentlicht 19.05.2024 11:15:49
- Zuletzt bearbeitet 12.05.2026 12:16:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
btrfs: send: handle path ref underflow in header iterate_inode_ref()
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version < 4.19.312
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.274
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.215
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.155
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.86
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.27
Linux ≫ Linux Kernel Version >= 6.7 < 6.8.6
Debian ≫ Debian Linux Version10.0
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.05 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 3.3 | 1.8 | 1.4 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
CWE-209 Generation of Error Message Containing Sensitive Information
The product generates an error message that includes sensitive information about its environment, users, or associated data.