๐Ÿ” CVE Alert

CVE-2024-46753

UNKNOWN 0.0

btrfs: handle errors from btrfs_dec_ref() properly

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: btrfs: handle errors from btrfs_dec_ref() properly In walk_up_proc() we BUG_ON(ret) from btrfs_dec_ref(). This is incorrect, we have proper error handling here, return the error.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2c47e605a91dde6b0514f689645e7ab336c8592a < 0e4840ae09f375381167000ce47424818fcbcc7c 2c47e605a91dde6b0514f689645e7ab336c8592a < 2c4fe45351e544da4b8f10c74b277117a4fa7869 2c47e605a91dde6b0514f689645e7ab336c8592a < 9c8237021b53d52357c0de07a768582fafb2791d 2c47e605a91dde6b0514f689645e7ab336c8592a < 67e4ca7ddc67ef949326b4dc404a9678bbe67d72 2c47e605a91dde6b0514f689645e7ab336c8592a < a7f16a7a709845855cb5a0e080a52bda5873f9de 2c47e605a91dde6b0514f689645e7ab336c8592a < 5eb178f373b4f16f3b42d55ff88fc94dd95b93b1
Linux / Linux
2.6.31

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0e4840ae09f375381167000ce47424818fcbcc7c git.kernel.org: https://git.kernel.org/stable/c/2c4fe45351e544da4b8f10c74b277117a4fa7869 git.kernel.org: https://git.kernel.org/stable/c/9c8237021b53d52357c0de07a768582fafb2791d git.kernel.org: https://git.kernel.org/stable/c/67e4ca7ddc67ef949326b4dc404a9678bbe67d72 git.kernel.org: https://git.kernel.org/stable/c/a7f16a7a709845855cb5a0e080a52bda5873f9de git.kernel.org: https://git.kernel.org/stable/c/5eb178f373b4f16f3b42d55ff88fc94dd95b93b1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html