Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-39276

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-25 Jun, 2024 | 14:22
Updated At-04 May, 2025 | 12:56
Rejected At-
Credits

ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()

In the Linux kernel, the following vulnerability has been resolved: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() Syzbot reports a warning as follows: ============================================ WARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290 Modules linked in: CPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7 RIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419 Call Trace: <TASK> ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375 generic_shutdown_super+0x136/0x2d0 fs/super.c:641 kill_block_super+0x44/0x90 fs/super.c:1675 ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327 [...] ============================================ This is because when finding an entry in ext4_xattr_block_cache_find(), if ext4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown in the __entry_find(), won't be put away, and eventually trigger the above issue in mb_cache_destroy() due to reference count leakage. So call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:25 Jun, 2024 | 14:22
Updated At:04 May, 2025 | 12:56
Rejected At:
▼CVE Numbering Authority (CNA)
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()

In the Linux kernel, the following vulnerability has been resolved: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() Syzbot reports a warning as follows: ============================================ WARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290 Modules linked in: CPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7 RIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419 Call Trace: <TASK> ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375 generic_shutdown_super+0x136/0x2d0 fs/super.c:641 kill_block_super+0x44/0x90 fs/super.c:1675 ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327 [...] ============================================ This is because when finding an entry in ext4_xattr_block_cache_find(), if ext4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown in the __entry_find(), won't be put away, and eventually trigger the above issue in mb_cache_destroy() due to reference count leakage. So call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/ext4/xattr.c
Default Status
unaffected
Versions
Affected
  • From b878c8a7f08f0c225b6a46ba1ac867e9c5d17807 before 9ad75e78747b5a50dc5a52f0f8e92e920a653f16 (git)
  • From fb265c9cb49e2074ddcdd4de99728aefdd3b3592 before 896a7e7d0d555ad8b2b46af0c2fa7de7467f9483 (git)
  • From fb265c9cb49e2074ddcdd4de99728aefdd3b3592 before 76dc776153a47372719d664e0fc50d6355791abb (git)
  • From fb265c9cb49e2074ddcdd4de99728aefdd3b3592 before 681ff9a09accd8a4379f8bd30b7a1641ee19bb3e (git)
  • From fb265c9cb49e2074ddcdd4de99728aefdd3b3592 before e941b712e758f615d311946bf98216e79145ccd9 (git)
  • From fb265c9cb49e2074ddcdd4de99728aefdd3b3592 before a95df6f04f2c37291adf26a74205cde0314d4577 (git)
  • From fb265c9cb49e2074ddcdd4de99728aefdd3b3592 before b37c0edef4e66fb21a2fbc211471195a383e5ab8 (git)
  • From fb265c9cb49e2074ddcdd4de99728aefdd3b3592 before 0c0b4a49d3e7f49690a6827a41faeffad5df7e21 (git)
  • 9da1f6d06b7a6d068e68fcfd7cbbf6b586d888e1 (git)
  • 81313ed2c705d958744882a269bf4a5e3ddec95e (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/ext4/xattr.c
Default Status
affected
Versions
Affected
  • 5.0
Unaffected
  • From 0 before 5.0 (semver)
  • From 4.19.316 through 4.19.* (semver)
  • From 5.4.278 through 5.4.* (semver)
  • From 5.10.219 through 5.10.* (semver)
  • From 5.15.161 through 5.15.* (semver)
  • From 6.1.94 through 6.1.* (semver)
  • From 6.6.34 through 6.6.* (semver)
  • From 6.9.5 through 6.9.* (semver)
  • From 6.10 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16
N/A
https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483
N/A
https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb
N/A
https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e
N/A
https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9
N/A
https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577
N/A
https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8
N/A
https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21
N/A
Hyperlink: https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16
x_transferred
https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483
x_transferred
https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb
x_transferred
https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e
x_transferred
https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9
x_transferred
https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577
x_transferred
https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8
x_transferred
https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21
x_transferred
Hyperlink: https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:25 Jun, 2024 | 15:15
Updated At:24 Mar, 2025 | 17:28

In the Linux kernel, the following vulnerability has been resolved: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() Syzbot reports a warning as follows: ============================================ WARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290 Modules linked in: CPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7 RIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419 Call Trace: <TASK> ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375 generic_shutdown_super+0x136/0x2d0 fs/super.c:641 kill_block_super+0x44/0x90 fs/super.c:1675 ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327 [...] ============================================ This is because when finding an entry in ext4_xattr_block_cache_find(), if ext4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown in the __entry_find(), won't be put away, and eventually trigger the above issue in mb_cache_destroy() due to reference count leakage. So call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.14.92(inclusive) to 4.15(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.19.14(inclusive) to 4.19.316(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20.1(inclusive) to 5.4.278(inclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.15.161(inclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.94(inclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.34(inclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.9.5(inclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3eaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abbaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9af854a3a-2127-422b-91ae-364da2661108
Patch
Hyperlink: https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found