๐Ÿ” CVE Alert

CVE-2024-56774

MEDIUM 5.5

btrfs: add a sanity check for btrfs root in btrfs_search_slot()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: btrfs: add a sanity check for btrfs root in btrfs_search_slot() Syzbot reports a null-ptr-deref in btrfs_search_slot(). The reproducer is using rescue=ibadroots, and the extent tree root is corrupted thus the extent tree is NULL. When scrub tries to search the extent tree to gather the needed extent info, btrfs_search_slot() doesn't check if the target root is NULL or not, resulting the null-ptr-deref. Add sanity check for btrfs root before using it in btrfs_search_slot().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
42437a6386ffeaaf200731e73d723ea491f3fe7d < c71d114ef68c95da5a82ec85a721ab31f5bd905b 42437a6386ffeaaf200731e73d723ea491f3fe7d < db66fb87c21e8ae724886e6a464dcbac562a64c6 42437a6386ffeaaf200731e73d723ea491f3fe7d < 757171d1369b3b47f36932d40a05a0715496dcab 42437a6386ffeaaf200731e73d723ea491f3fe7d < 93992c3d9629b02dccf6849238559d5c24f2dece 42437a6386ffeaaf200731e73d723ea491f3fe7d < 3ed51857a50f530ac7a1482e069dfbd1298558d4
Linux / Linux
5.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c71d114ef68c95da5a82ec85a721ab31f5bd905b git.kernel.org: https://git.kernel.org/stable/c/db66fb87c21e8ae724886e6a464dcbac562a64c6 git.kernel.org: https://git.kernel.org/stable/c/757171d1369b3b47f36932d40a05a0715496dcab git.kernel.org: https://git.kernel.org/stable/c/93992c3d9629b02dccf6849238559d5c24f2dece git.kernel.org: https://git.kernel.org/stable/c/3ed51857a50f530ac7a1482e069dfbd1298558d4 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html