cve-2024-47679
Vulnerability from cvelistv5
Published
2024-10-21 11:53
Modified
2024-12-19 09:25
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: vfs: fix race between evice_inodes() and find_inode()&iput() Hi, all Recently I noticed a bug[1] in btrfs, after digged it into and I believe it'a race in vfs. Let's assume there's a inode (ie ino 261) with i_count 1 is called by iput(), and there's a concurrent thread calling generic_shutdown_super(). cpu0: cpu1: iput() // i_count is 1 ->spin_lock(inode) ->dec i_count to 0 ->iput_final() generic_shutdown_super() ->__inode_add_lru() ->evict_inodes() // cause some reason[2] ->if (atomic_read(inode->i_count)) continue; // return before // inode 261 passed the above check // list_lru_add_obj() // and then schedule out ->spin_unlock() // note here: the inode 261 // was still at sb list and hash list, // and I_FREEING|I_WILL_FREE was not been set btrfs_iget() // after some function calls ->find_inode() // found the above inode 261 ->spin_lock(inode) // check I_FREEING|I_WILL_FREE // and passed ->__iget() ->spin_unlock(inode) // schedule back ->spin_lock(inode) // check (I_NEW|I_FREEING|I_WILL_FREE) flags, // passed and set I_FREEING iput() ->spin_unlock(inode) ->spin_lock(inode) ->evict() // dec i_count to 0 ->iput_final() ->spin_unlock() ->evict() Now, we have two threads simultaneously evicting the same inode, which may trigger the BUG(inode->i_state & I_CLEAR) statement both within clear_inode() and iput(). To fix the bug, recheck the inode->i_count after holding i_lock. Because in the most scenarios, the first check is valid, and the overhead of spin_lock() can be reduced. If there is any misunderstanding, please let me know, thanks. [1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/ [2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable() return false when I reproduced the bug.
Impacted products
Vendor Product Version
Linux Linux Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Version: 63997e98a3be68d7cec806d22bf9b02b2e1daabb
Create a notification for this product.
   Linux Linux Version: 2.6.37
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47679",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T13:07:33.659444Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T13:14:16.951Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/inode.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "6cc13a80a26e6b48f78c725c01b91987d61563ef",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "489faddb1ae75b0e1a741fe5ca2542a2b5e794a5",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "47a68c75052a660e4c37de41e321582ec9496195",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "3721a69403291e2514d13a7c3af50a006ea1153b",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "540fb13120c9eab3ef203f90c00c8e69f37449d1",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "0eed942bc65de1f93eca7bda51344290f9c573bb",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "6c857fb12b9137fee574443385d53914356bbe11",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            },
            {
              "lessThan": "88b1afbf0f6b221f6c5bb66cc80cd3b38d696687",
              "status": "affected",
              "version": "63997e98a3be68d7cec806d22bf9b02b2e1daabb",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/inode.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.37"
            },
            {
              "lessThan": "2.6.37",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.323",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.285",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.54",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: fix race between evice_inodes() and find_inode()\u0026iput()\n\nHi, all\n\nRecently I noticed a bug[1] in btrfs, after digged it into\nand I believe it\u0027a race in vfs.\n\nLet\u0027s assume there\u0027s a inode (ie ino 261) with i_count 1 is\ncalled by iput(), and there\u0027s a concurrent thread calling\ngeneric_shutdown_super().\n\ncpu0:                              cpu1:\niput() // i_count is 1\n  -\u003espin_lock(inode)\n  -\u003edec i_count to 0\n  -\u003eiput_final()                    generic_shutdown_super()\n    -\u003e__inode_add_lru()               -\u003eevict_inodes()\n      // cause some reason[2]           -\u003eif (atomic_read(inode-\u003ei_count)) continue;\n      // return before                  // inode 261 passed the above check\n      // list_lru_add_obj()             // and then schedule out\n   -\u003espin_unlock()\n// note here: the inode 261\n// was still at sb list and hash list,\n// and I_FREEING|I_WILL_FREE was not been set\n\nbtrfs_iget()\n  // after some function calls\n  -\u003efind_inode()\n    // found the above inode 261\n    -\u003espin_lock(inode)\n   // check I_FREEING|I_WILL_FREE\n   // and passed\n      -\u003e__iget()\n    -\u003espin_unlock(inode)                // schedule back\n                                        -\u003espin_lock(inode)\n                                        // check (I_NEW|I_FREEING|I_WILL_FREE) flags,\n                                        // passed and set I_FREEING\niput()                                  -\u003espin_unlock(inode)\n  -\u003espin_lock(inode)\t\t\t  -\u003eevict()\n  // dec i_count to 0\n  -\u003eiput_final()\n    -\u003espin_unlock()\n    -\u003eevict()\n\nNow, we have two threads simultaneously evicting\nthe same inode, which may trigger the BUG(inode-\u003ei_state \u0026 I_CLEAR)\nstatement both within clear_inode() and iput().\n\nTo fix the bug, recheck the inode-\u003ei_count after holding i_lock.\nBecause in the most scenarios, the first check is valid, and\nthe overhead of spin_lock() can be reduced.\n\nIf there is any misunderstanding, please let me know, thanks.\n\n[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/\n[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()\nreturn false when I reproduced the bug."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:25:45.420Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/6cc13a80a26e6b48f78c725c01b91987d61563ef"
        },
        {
          "url": "https://git.kernel.org/stable/c/489faddb1ae75b0e1a741fe5ca2542a2b5e794a5"
        },
        {
          "url": "https://git.kernel.org/stable/c/47a68c75052a660e4c37de41e321582ec9496195"
        },
        {
          "url": "https://git.kernel.org/stable/c/3721a69403291e2514d13a7c3af50a006ea1153b"
        },
        {
          "url": "https://git.kernel.org/stable/c/540fb13120c9eab3ef203f90c00c8e69f37449d1"
        },
        {
          "url": "https://git.kernel.org/stable/c/0eed942bc65de1f93eca7bda51344290f9c573bb"
        },
        {
          "url": "https://git.kernel.org/stable/c/0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1"
        },
        {
          "url": "https://git.kernel.org/stable/c/6c857fb12b9137fee574443385d53914356bbe11"
        },
        {
          "url": "https://git.kernel.org/stable/c/88b1afbf0f6b221f6c5bb66cc80cd3b38d696687"
        }
      ],
      "title": "vfs: fix race between evice_inodes() and find_inode()\u0026iput()",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-47679",
    "datePublished": "2024-10-21T11:53:22.469Z",
    "dateReserved": "2024-09-30T16:00:12.939Z",
    "dateUpdated": "2024-12-19T09:25:45.420Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-47679\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T12:15:04.920\",\"lastModified\":\"2024-11-08T16:15:24.843\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvfs: fix race between evice_inodes() and find_inode()\u0026iput()\\n\\nHi, all\\n\\nRecently I noticed a bug[1] in btrfs, after digged it into\\nand I believe it\u0027a race in vfs.\\n\\nLet\u0027s assume there\u0027s a inode (ie ino 261) with i_count 1 is\\ncalled by iput(), and there\u0027s a concurrent thread calling\\ngeneric_shutdown_super().\\n\\ncpu0:                              cpu1:\\niput() // i_count is 1\\n  -\u003espin_lock(inode)\\n  -\u003edec i_count to 0\\n  -\u003eiput_final()                    generic_shutdown_super()\\n    -\u003e__inode_add_lru()               -\u003eevict_inodes()\\n      // cause some reason[2]           -\u003eif (atomic_read(inode-\u003ei_count)) continue;\\n      // return before                  // inode 261 passed the above check\\n      // list_lru_add_obj()             // and then schedule out\\n   -\u003espin_unlock()\\n// note here: the inode 261\\n// was still at sb list and hash list,\\n// and I_FREEING|I_WILL_FREE was not been set\\n\\nbtrfs_iget()\\n  // after some function calls\\n  -\u003efind_inode()\\n    // found the above inode 261\\n    -\u003espin_lock(inode)\\n   // check I_FREEING|I_WILL_FREE\\n   // and passed\\n      -\u003e__iget()\\n    -\u003espin_unlock(inode)                // schedule back\\n                                        -\u003espin_lock(inode)\\n                                        // check (I_NEW|I_FREEING|I_WILL_FREE) flags,\\n                                        // passed and set I_FREEING\\niput()                                  -\u003espin_unlock(inode)\\n  -\u003espin_lock(inode)\\t\\t\\t  -\u003eevict()\\n  // dec i_count to 0\\n  -\u003eiput_final()\\n    -\u003espin_unlock()\\n    -\u003eevict()\\n\\nNow, we have two threads simultaneously evicting\\nthe same inode, which may trigger the BUG(inode-\u003ei_state \u0026 I_CLEAR)\\nstatement both within clear_inode() and iput().\\n\\nTo fix the bug, recheck the inode-\u003ei_count after holding i_lock.\\nBecause in the most scenarios, the first check is valid, and\\nthe overhead of spin_lock() can be reduced.\\n\\nIf there is any misunderstanding, please let me know, thanks.\\n\\n[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/\\n[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()\\nreturn false when I reproduced the bug.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfs: arregla la ejecuci\u00f3n entre evice_inodes() y find_inode()\u0026amp;iput() Hola a todos Recientemente not\u00e9 un error[1] en btrfs, despu\u00e9s de investigarlo y creo que es una ejecuci\u00f3n en vfs. Supongamos que hay un inodo (es decir, ino 261) con i_count 1 que es llamado por iput(), y hay un hilo concurrente que llama a generic_shutdown_super(). cpu0: cpu1: iput() // i_count es 1 -\u0026gt;spin_lock(inode) -\u0026gt;dec i_count a 0 -\u0026gt;iput_final() generic_shutdown_super() -\u0026gt;__inode_add_lru() -\u0026gt;evict_inodes() // por alguna raz\u00f3n[2] -\u0026gt;if (atomic_read(inode-\u0026gt;i_count)) continue; // regresar antes // el inodo 261 pas\u00f3 la verificaci\u00f3n anterior // list_lru_add_obj() // y luego programar la salida -\u0026gt;spin_unlock() // nota aqu\u00ed: el inodo 261 // todav\u00eda estaba en la lista sb y la lista hash, // y I_FREEING|I_WILL_FREE no se hab\u00eda establecido btrfs_iget() // despu\u00e9s de algunas llamadas de funci\u00f3n -\u0026gt;find_inode() // encontr\u00f3 el inodo 261 anterior -\u0026gt;spin_lock(inode) // verific\u00f3 I_FREEING|I_WILL_FREE // y pas\u00f3 -\u0026gt;__iget() -\u0026gt;spin_unlock(inode) // program\u00f3 de regreso -\u0026gt;spin_lock(inode) // verific\u00f3 los indicadores (I_NEW|I_FREEING|I_WILL_FREE), // pas\u00f3 y estableci\u00f3 I_FREEING iput() -\u0026gt;spin_unlock(inode) -\u0026gt;spin_lock(inode) -\u0026gt;evict() // dec i_count a 0 -\u0026gt;iput_final() -\u0026gt;spin_unlock() -\u0026gt;evict() Ahora, tenemos dos subprocesos expulsando simult\u00e1neamente el mismo inodo, lo que puede activar la declaraci\u00f3n BUG(inode-\u0026gt;i_state \u0026amp; I_CLEAR) tanto dentro de clear_inode() como de iput(). Para corregir el error, vuelva a verificar inode-\u0026gt;i_count despu\u00e9s de mantener i_lock. Porque en la mayor\u00eda de los escenarios, la primera verificaci\u00f3n es v\u00e1lida y se puede reducir la sobrecarga de spin_lock(). Si hay alg\u00fan malentendido, h\u00e1gamelo saber, gracias. [1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/ [2]: La raz\u00f3n podr\u00eda ser 1. SB_ACTIVE fue eliminado o 2. mapping_shrinkable() devolvi\u00f3 falso cuando reproduje el error.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.37\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"205A6F87-4258-4528-8078-AC66AD2A7B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.54\",\"matchCriteriaId\":\"D448821D-C085-4CAF-88FA-2DDE7BE21976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.13\",\"matchCriteriaId\":\"CE94BB8D-B0AB-4563-9ED7-A12122B56EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.2\",\"matchCriteriaId\":\"AB755D26-97F4-43B6-8604-CD076811E181\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0eed942bc65de1f93eca7bda51344290f9c573bb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3721a69403291e2514d13a7c3af50a006ea1153b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/47a68c75052a660e4c37de41e321582ec9496195\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/489faddb1ae75b0e1a741fe5ca2542a2b5e794a5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/540fb13120c9eab3ef203f90c00c8e69f37449d1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6c857fb12b9137fee574443385d53914356bbe11\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6cc13a80a26e6b48f78c725c01b91987d61563ef\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/88b1afbf0f6b221f6c5bb66cc80cd3b38d696687\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47679\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T13:07:33.659444Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T13:07:37.060Z\"}}], \"cna\": {\"title\": \"vfs: fix race between evice_inodes() and find_inode()\u0026iput()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"6cc13a80a26e6b48f78c725c01b91987d61563ef\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"489faddb1ae75b0e1a741fe5ca2542a2b5e794a5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"47a68c75052a660e4c37de41e321582ec9496195\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"3721a69403291e2514d13a7c3af50a006ea1153b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"540fb13120c9eab3ef203f90c00c8e69f37449d1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"0eed942bc65de1f93eca7bda51344290f9c573bb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"6c857fb12b9137fee574443385d53914356bbe11\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"63997e98a3be68d7cec806d22bf9b02b2e1daabb\", \"lessThan\": \"88b1afbf0f6b221f6c5bb66cc80cd3b38d696687\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/inode.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.37\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.37\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.323\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.54\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/inode.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/6cc13a80a26e6b48f78c725c01b91987d61563ef\"}, {\"url\": \"https://git.kernel.org/stable/c/489faddb1ae75b0e1a741fe5ca2542a2b5e794a5\"}, {\"url\": \"https://git.kernel.org/stable/c/47a68c75052a660e4c37de41e321582ec9496195\"}, {\"url\": \"https://git.kernel.org/stable/c/3721a69403291e2514d13a7c3af50a006ea1153b\"}, {\"url\": \"https://git.kernel.org/stable/c/540fb13120c9eab3ef203f90c00c8e69f37449d1\"}, {\"url\": \"https://git.kernel.org/stable/c/0eed942bc65de1f93eca7bda51344290f9c573bb\"}, {\"url\": \"https://git.kernel.org/stable/c/0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1\"}, {\"url\": \"https://git.kernel.org/stable/c/6c857fb12b9137fee574443385d53914356bbe11\"}, {\"url\": \"https://git.kernel.org/stable/c/88b1afbf0f6b221f6c5bb66cc80cd3b38d696687\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvfs: fix race between evice_inodes() and find_inode()\u0026iput()\\n\\nHi, all\\n\\nRecently I noticed a bug[1] in btrfs, after digged it into\\nand I believe it\u0027a race in vfs.\\n\\nLet\u0027s assume there\u0027s a inode (ie ino 261) with i_count 1 is\\ncalled by iput(), and there\u0027s a concurrent thread calling\\ngeneric_shutdown_super().\\n\\ncpu0:                              cpu1:\\niput() // i_count is 1\\n  -\u003espin_lock(inode)\\n  -\u003edec i_count to 0\\n  -\u003eiput_final()                    generic_shutdown_super()\\n    -\u003e__inode_add_lru()               -\u003eevict_inodes()\\n      // cause some reason[2]           -\u003eif (atomic_read(inode-\u003ei_count)) continue;\\n      // return before                  // inode 261 passed the above check\\n      // list_lru_add_obj()             // and then schedule out\\n   -\u003espin_unlock()\\n// note here: the inode 261\\n// was still at sb list and hash list,\\n// and I_FREEING|I_WILL_FREE was not been set\\n\\nbtrfs_iget()\\n  // after some function calls\\n  -\u003efind_inode()\\n    // found the above inode 261\\n    -\u003espin_lock(inode)\\n   // check I_FREEING|I_WILL_FREE\\n   // and passed\\n      -\u003e__iget()\\n    -\u003espin_unlock(inode)                // schedule back\\n                                        -\u003espin_lock(inode)\\n                                        // check (I_NEW|I_FREEING|I_WILL_FREE) flags,\\n                                        // passed and set I_FREEING\\niput()                                  -\u003espin_unlock(inode)\\n  -\u003espin_lock(inode)\\t\\t\\t  -\u003eevict()\\n  // dec i_count to 0\\n  -\u003eiput_final()\\n    -\u003espin_unlock()\\n    -\u003eevict()\\n\\nNow, we have two threads simultaneously evicting\\nthe same inode, which may trigger the BUG(inode-\u003ei_state \u0026 I_CLEAR)\\nstatement both within clear_inode() and iput().\\n\\nTo fix the bug, recheck the inode-\u003ei_count after holding i_lock.\\nBecause in the most scenarios, the first check is valid, and\\nthe overhead of spin_lock() can be reduced.\\n\\nIf there is any misunderstanding, please let me know, thanks.\\n\\n[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/\\n[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()\\nreturn false when I reproduced the bug.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:25:45.420Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-47679\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:25:45.420Z\", \"dateReserved\": \"2024-09-30T16:00:12.939Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T11:53:22.469Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.