Executive Summary

Informations
Name CVE-2024-50273 First vendor Publication 2024-11-19
Vendor Cve Last vendor Modification 2024-11-27

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

btrfs: reinitialize delayed ref list after deleting it from the list

At insert_delayed_ref() if we need to update the action of an existing ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's ref_add_list using list_del(), which leaves the ref's add_list member not reinitialized, as list_del() sets the next and prev members of the list to LIST_POISON1 and LIST_POISON2, respectively.

If later we end up calling drop_delayed_ref() against the ref, which can happen during merging or when destroying delayed refs due to a transaction abort, we can trigger a crash since at drop_delayed_ref() we call list_empty() against the ref's add_list, which returns false since the list was not reinitialized after the list_del() and as a consequence we call list_del() again at drop_delayed_ref(). This results in an invalid list access since the next and prev members are set to poison pointers, resulting in a splat if CONFIG_LIST_HARDENED and CONFIG_DEBUG_LIST are set or invalid poison pointer dereferences otherwise.

So fix this by deleting from the list with list_del_init() instead.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3688

Sources (Detail)

https://git.kernel.org/stable/c/2cb1a73d1d44a1c11b0ee5eeced765dd80ec48e6
https://git.kernel.org/stable/c/2fd0948a483e9cb2d669c7199bc620a21c97673d
https://git.kernel.org/stable/c/50a3933760b427759afdd23156a7280a19357a92
https://git.kernel.org/stable/c/93c5b8decc0ef39ba84f4211d2db6da0a4aefbeb
https://git.kernel.org/stable/c/bf0b0c6d159767c0d1c21f793950d78486690ee0
https://git.kernel.org/stable/c/c24fa427fc0ae827b2a3a07f13738cbf82c3f851
https://git.kernel.org/stable/c/c9a75ec45f1111ef530ab186c2a7684d0a0c9245
https://git.kernel.org/stable/c/f04be6d68f715c1473a8422fc0460f57b5e99931
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Date Informations
2025-03-29 03:43:04
  • Multiple Updates
2025-03-28 13:46:47
  • Multiple Updates
2025-03-28 03:20:47
  • Multiple Updates
2025-03-19 03:15:57
  • Multiple Updates
2025-03-18 03:28:56
  • Multiple Updates
2025-03-14 03:16:08
  • Multiple Updates
2025-03-06 14:12:41
  • Multiple Updates
2025-02-22 03:26:14
  • Multiple Updates
2025-01-08 03:07:10
  • Multiple Updates
2025-01-07 03:06:42
  • Multiple Updates
2024-12-25 03:05:19
  • Multiple Updates
2024-12-12 03:08:14
  • Multiple Updates
2024-11-27 21:23:15
  • Multiple Updates
2024-11-20 03:02:02
  • Multiple Updates
2024-11-20 03:01:14
  • Multiple Updates
2024-11-20 00:20:28
  • Multiple Updates
2024-11-19 09:20:29
  • First insertion