CVE-2024-46840

Source
https://cve.org/CVERecord?id=CVE-2024-46840
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46840.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46840
Downstream
Related
Published
2024-09-27T12:39:34.998Z
Modified
2026-03-11T07:54:12.642514503Z
Summary
btrfs: clean up our handling of refs == 0 in snapshot delete
Details

In the Linux kernel, the following vulnerability has been resolved:

btrfs: clean up our handling of refs == 0 in snapshot delete

In reada we BUGON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answer. In walkdownproc we also BUGON(refs == 0), which could happen if we have extent tree corruption. Change that to return -EUCLEAN. In dowalkdown() we catch this case and handle it correctly, however we return -EIO, which -EUCLEAN is a more appropriate error code. Finally in walkupproc we have the same BUG_ON(refs == 0), so convert that to proper error handling. Also adjust the error message so we can actually do something with the information.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46840.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2c47e605a91dde6b0514f689645e7ab336c8592a
Fixed
c847b28a799733b04574060ab9d00f215970627d
Fixed
71291aa7246645ef622621934d2067400380645e
Fixed
c60676b81fab456b672796830f6d8057058f029c
Fixed
728d4d045b628e006b48a448f3326a7194c88d32
Fixed
9cc887ac24b7a0598f4042ae9af6b9a33072f75b
Fixed
7d1df13bf078ffebfedd361d714ff6cee1ff01b9
Fixed
03804641ec2d0da4fa088ad21c88e703d151ce16
Fixed
b8ccef048354074a548f108e51d0557d6adfd3a3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46840.json"