Lucene search

K
redhatcveRedhat.comRH:CVE-2024-44963
HistorySep 04, 2024 - 8:46 p.m.

CVE-2024-44963

2024-09-0420:46:06
redhat.com
access.redhat.com
1
linux kernel
vulnerability
btrfs
error
memory allocation

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

9.6%

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not BUG_ON() when freeing tree block after error When freeing a tree block, at btrfs_free_tree_block(), if we fail to create a delayed reference we don’t deal with the error and just do a BUG_ON(). The error most likely to happen is -ENOMEM, and we have a comment mentioning that only -ENOMEM can happen, but that is not true, because in case qgroups are enabled any error returned from btrfs_qgroup_trace_extent_post() (can be -EUCLEAN or anything returned from btrfs_search_slot() for example) can be propagated back to btrfs_free_tree_block(). So stop doing a BUG_ON() and return the error to the callers and make them abort the transaction to prevent leaking space. Syzbot was triggering this, likely due to memory allocation failure injection.

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

9.6%

Related for RH:CVE-2024-44963