CVE-2024-49983
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free<br />
<br />
When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(),<br />
the &#39;ppath&#39; is updated but it is the &#39;path&#39; that is freed, thus potentially<br />
triggering a double-free in the following process:<br />
<br />
ext4_ext_replay_update_ex<br />
ppath = path<br />
ext4_force_split_extent_at(&ppath)<br />
ext4_split_extent_at<br />
ext4_ext_insert_extent<br />
ext4_ext_create_new_leaf<br />
ext4_ext_grow_indepth<br />
ext4_find_extent<br />
if (depth > path[0].p_maxdepth)<br />
kfree(path) ---> path First freed<br />
*orig_path = path = NULL ---> null ppath<br />
kfree(path) ---> path double-free !!!<br />
<br />
So drop the unnecessary ppath and use path directly to avoid this problem.<br />
And use ext4_find_extent() directly to update path, avoiding unnecessary<br />
memory allocation and freeing. Also, propagate the error returned by<br />
ext4_find_extent() instead of using strange error codes.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.227 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.55 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1b558006d98b7b0b730027be0ee98973dd10ee0d
- https://git.kernel.org/stable/c/3ff710662e8d86a63a39b334e9ca0cb10e5c14b0
- https://git.kernel.org/stable/c/5c0f4cc84d3a601c99bc5e6e6eb1cbda542cce95
- https://git.kernel.org/stable/c/6367d3f04c69e2b8770b8137bd800e0784b0abbc
- https://git.kernel.org/stable/c/63adc9016917e6970fb0104ee5fd6770f02b2d80
- https://git.kernel.org/stable/c/8c26d9e53e5fbacda0732a577e97c5a5b7882aaf
- https://git.kernel.org/stable/c/a34bed978364114390162c27e50fca50791c568d
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



