In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: handle path ref underflow in header iterate_inode_ref()
Change BUG_ON to proper error handling if building the path buffer fails. The pointers are not printed so we don't accidentally leak kernel addresses.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | - | 4.19.312 |
| linux / linux_kernel | 4.20 | 5.4.274 |
| linux / linux_kernel | 5.5 | 5.10.215 |
| linux / linux_kernel | 5.11 | 5.15.155 |
| linux / linux_kernel | 5.16 | 6.1.86 |
| linux / linux_kernel | 6.2 | 6.6.27 |
| linux / linux_kernel | 6.7 | 6.8.6 |
| debian / debian_linux | 10.0 | 10.0.x |