CVE-2024-35935

In the Linux kernel, the following vulnerability has been resolved: btrfs: send: handle path ref underflow in header iterate_inode_ref() Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 19:27

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-209
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3
References () https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229 - () https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229 - Patch
References () https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5 - () https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5 - Patch
References () https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a - () https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a - Patch
References () https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501 - () https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501 - Patch
References () https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9 - () https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9 - Patch
References () https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c - () https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c - Patch
References () https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3 - () https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3 - Patch
References () https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183 - () https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:21

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229 - () https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229 -
References () https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5 - () https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5 -
References () https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a - () https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a -
References () https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501 - () https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501 -
References () https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9 - () https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9 -
References () https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c - () https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c -
References () https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3 - () https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3 -
References () https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183 - () https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: enviar: manejar el desbordamiento de la referencia de ruta en el encabezado iterate_inode_ref() Cambie BUG_ON al manejo adecuado de errores si falla la creación del búfer de ruta. Los punteros no se imprimen para no filtrar accidentalmente las direcciones del kernel.

19 May 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 11:15

Updated : 2025-12-23 19:27


NVD link : CVE-2024-35935

Mitre link : CVE-2024-35935

CVE.ORG link : CVE-2024-35935


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-209

Generation of Error Message Containing Sensitive Information