{"id":"CVE-2024-46840","summary":"btrfs: clean up our handling of refs == 0 in snapshot delete","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: clean up our handling of refs == 0 in snapshot delete\n\nIn reada we BUG_ON(refs == 0), which could be unkind since we aren't\nholding a lock on the extent leaf and thus could get a transient\nincorrect answer.  In walk_down_proc we also BUG_ON(refs == 0), which\ncould happen if we have extent tree corruption.  Change that to return\n-EUCLEAN.  In do_walk_down() we catch this case and handle it correctly,\nhowever we return -EIO, which -EUCLEAN is a more appropriate error code.\nFinally in walk_up_proc we have the same BUG_ON(refs == 0), so convert\nthat to proper error handling.  Also adjust the error message so we can\nactually do something with the information.","modified":"2026-04-02T12:19:45.406906Z","published":"2024-09-27T12:39:34.998Z","related":["SUSE-SU-2024:3983-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4100-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:0034-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46840.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/03804641ec2d0da4fa088ad21c88e703d151ce16"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71291aa7246645ef622621934d2067400380645e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/728d4d045b628e006b48a448f3326a7194c88d32"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7d1df13bf078ffebfedd361d714ff6cee1ff01b9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9cc887ac24b7a0598f4042ae9af6b9a33072f75b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8ccef048354074a548f108e51d0557d6adfd3a3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c60676b81fab456b672796830f6d8057058f029c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c847b28a799733b04574060ab9d00f215970627d"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46840.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46840"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2c47e605a91dde6b0514f689645e7ab336c8592a"},{"fixed":"c847b28a799733b04574060ab9d00f215970627d"},{"fixed":"71291aa7246645ef622621934d2067400380645e"},{"fixed":"c60676b81fab456b672796830f6d8057058f029c"},{"fixed":"728d4d045b628e006b48a448f3326a7194c88d32"},{"fixed":"9cc887ac24b7a0598f4042ae9af6b9a33072f75b"},{"fixed":"7d1df13bf078ffebfedd361d714ff6cee1ff01b9"},{"fixed":"03804641ec2d0da4fa088ad21c88e703d151ce16"},{"fixed":"b8ccef048354074a548f108e51d0557d6adfd3a3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46840.json"}}],"schema_version":"1.7.5"}