We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49881

ext4: update orig_path in ext4_find_extent()



Description

In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent() In ext4_find_extent(), if the path is not big enough, we free it and set *orig_path to NULL. But after reallocating and successfully initializing the path, we don't update *orig_path, in which case the caller gets a valid path but a NULL ppath, and this may cause a NULL pointer dereference or a path memory leak. For example: ext4_split_extent path = *ppath = 2000 ext4_find_extent if (depth > path[0].p_maxdepth) kfree(path = 2000); *orig_path = path = NULL; path = kcalloc() = 3000 ext4_split_extent_at(*ppath = NULL) path = *ppath; ex = path[depth].p_ext; // NULL pointer dereference! ================================================================== BUG: kernel NULL pointer dereference, address: 0000000000000010 CPU: 6 UID: 0 PID: 576 Comm: fsstress Not tainted 6.11.0-rc2-dirty #847 RIP: 0010:ext4_split_extent_at+0x6d/0x560 Call Trace: <TASK> ext4_split_extent.isra.0+0xcb/0x1b0 ext4_ext_convert_to_initialized+0x168/0x6c0 ext4_ext_handle_unwritten_extents+0x325/0x4d0 ext4_ext_map_blocks+0x520/0xdb0 ext4_map_blocks+0x2b0/0x690 ext4_iomap_begin+0x20e/0x2c0 [...] ================================================================== Therefore, *orig_path is updated when the extent lookup succeeds, so that the caller can safely use path or *ppath.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

10809df84a4d868db61af621bae3658494165279 before ec0c0beb9b777cdd1edd7df9b36e0f3e67e2bdff
affected

10809df84a4d868db61af621bae3658494165279 before 6766937d0327000ac1b87c97bbecdd28b0dd6599
affected

10809df84a4d868db61af621bae3658494165279 before a9fcb1717d75061d3653ed69365c8d45331815cd
affected

10809df84a4d868db61af621bae3658494165279 before 6801ed1298204d16a38571091e31178bfdc3c679
affected

10809df84a4d868db61af621bae3658494165279 before f55ecc58d07a6c1f6d6d5b5af125c25f8da0bda2
affected

10809df84a4d868db61af621bae3658494165279 before b63481b3a388ee2df9e295f97273226140422a42
affected

10809df84a4d868db61af621bae3658494165279 before 11b230100d6801c014fab2afabc8bdea304c1b96
affected

10809df84a4d868db61af621bae3658494165279 before 5b4b2dcace35f618fe361a87bae6f0d13af31bc1
affected

Default status
affected

3.18
affected

Any version before 3.18
unaffected

4.19.323
unaffected

5.10.227
unaffected

5.15.168
unaffected

6.1.113
unaffected

6.6.55
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/ec0c0beb9b777cdd1edd7df9b36e0f3e67e2bdff

git.kernel.org/...c/6766937d0327000ac1b87c97bbecdd28b0dd6599

git.kernel.org/...c/a9fcb1717d75061d3653ed69365c8d45331815cd

git.kernel.org/...c/6801ed1298204d16a38571091e31178bfdc3c679

git.kernel.org/...c/f55ecc58d07a6c1f6d6d5b5af125c25f8da0bda2

git.kernel.org/...c/b63481b3a388ee2df9e295f97273226140422a42

git.kernel.org/...c/11b230100d6801c014fab2afabc8bdea304c1b96

git.kernel.org/...c/5b4b2dcace35f618fe361a87bae6f0d13af31bc1

cve.org (CVE-2024-49881)

nvd.nist.gov (CVE-2024-49881)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-49881

Support options

Helpdesk Chat, Email, Knowledgebase