In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: handle path ref underflow in header iterate_inode_ref()
Change BUG_ON to proper error handling if building the path buffer
fails. The pointers are not printed so we don't accidentally leak kernel
addresses.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2024-05-19 11:15
Updated : 2025-12-23 19:27
NVD link : CVE-2024-35935
Mitre link : CVE-2024-35935
CVE.ORG link : CVE-2024-35935
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-209
Generation of Error Message Containing Sensitive Information
