Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() Instead of doing a BUG_ON() handle the error by returning -EUCLEAN, aborting the transaction and logging an error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.10.10 |
References
- https://git.kernel.org/stable/c/18eb53a2734ff61b9a72c4fef5db7b38cb48ae16
- https://git.kernel.org/stable/c/28cb13f29faf6290597b24b728dc3100c019356fPatch
- https://git.kernel.org/stable/c/3cfec712a439c5c5f5c718c5c669ee41a898f776
- https://git.kernel.org/stable/c/9c309d2434abbe880712af7e60da9ead8b6703fe
- https://git.kernel.org/stable/c/d64807ded1b6054f066e03d8add6d920f3db9e5d
- https://git.kernel.org/stable/c/ef9a8b73c8b60b27d9db4787e624a3438ffe8428Patch
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
FAQ
What is CVE-2024-46751?
CVE-2024-46751 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() Instead of doing a BUG_ON() handle the error by returni...
How severe is CVE-2024-46751?
CVE-2024-46751 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-46751?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.