3.3
CVE-2024-35935
- EPSS 0.01%
- Veröffentlicht 19.05.2024 11:15:49
- Zuletzt bearbeitet 23.12.2025 19:27:44
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version < 4.19.312
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.274
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.215
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.155
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.86
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.27
Linux ≫ Linux Kernel Version >= 6.7 < 6.8.6
Debian ≫ Debian Linux Version10.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.014 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 3.3 | 1.8 | 1.4 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
CWE-209 Generation of Error Message Containing Sensitive Information
The product generates an error message that includes sensitive information about its environment, users, or associated data.