CVE-2024-41078

Source
https://cve.org/CVERecord?id=CVE-2024-41078
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41078.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41078
Downstream
Related
Published
2024-07-29T15:04:15.812Z
Modified
2026-03-20T12:35:37.352551Z
Summary
btrfs: qgroup: fix quota root leak after quota disable failure
Details

In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix quota root leak after quota disable failure

If during the quota disable we fail when cleaning the quota tree or when deleting the root from the root tree, we jump to the 'out' label without ever dropping the reference on the quota root, resulting in a leak of the root since fsinfo->quotaroot is no longer pointing to the root (we have set it to NULL just before those steps).

Fix this by always doing a btrfsputroot() call under the 'out' label. This is a problem that exists since qgroups were first added in 2012 by commit bed92eae26cc ("Btrfs: qgroup implementation and prototypes"), but back then we missed a kfree on the quota root and freeextentbuffer() calls on its root and commit root nodes, since back then roots were not yet reference counted.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41078.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bed92eae26ccf280d1a2168b7509447b56675a27
Fixed
94818bdb00ef34a996a06aa63d11f591074cb757
Fixed
8a69529f22590b67bb018de9acbcf94abc8603cf
Fixed
5ef3961682e5310f2221bae99bcf9f5d0f4b0d51
Fixed
f88aeff5a173e8ba3133314eb4b964236ef3589d
Fixed
7dd6a5b96157a21245566b21fd58276a214357ff
Fixed
a7e4c6a3031c74078dba7fa36239d0f4fe476c53

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41078.json"