cve-2024-26696
Vulnerability from cvelistv5
Published
2024-04-03 14:54
Modified
2024-12-19 08:45
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() Syzbot reported a hang issue in migrate_pages_batch() called by mbind() and nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2. While migrate_pages_batch() locks a folio and waits for the writeback to complete, the log writer thread that should bring the writeback to completion picks up the folio being written back in nilfs_lookup_dirty_data_buffers() that it calls for subsequent log creation and was trying to lock the folio. Thus causing a deadlock. In the first place, it is unexpected that folios/pages in the middle of writeback will be updated and become dirty. Nilfs2 adds a checksum to verify the validity of the log being written and uses it for recovery at mount, so data changes during writeback are suppressed. Since this is broken, an unclean shutdown could potentially cause recovery to fail. Investigation revealed that the root cause is that the wait for writeback completion in nilfs_page_mkwrite() is conditional, and if the backing device does not require stable writes, data may be modified without waiting. Fix these issues by making nilfs_page_mkwrite() wait for writeback to finish regardless of the stable write requirement of the backing device.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Impacted products
Vendor Product Version
Linux Linux Version: 3.9
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:14:12.590Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26696",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:52:53.851812Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:30.066Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/nilfs2/file.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "228742b2ddfb99dfd71e5a307e6088ab6836272e",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            },
            {
              "lessThan": "862ee4422c38be5c249844a684b00d0dbe9d1e46",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            },
            {
              "lessThan": "98a4026b22ff440c7f47056481bcbbe442f607d6",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            },
            {
              "lessThan": "7e9b622bd0748cc104d66535b76d9b3535f9dc0f",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            },
            {
              "lessThan": "8494ba2c9ea00a54d5b50e69b22c55a8958bce32",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            },
            {
              "lessThan": "ea5ddbc11613b55e5128c85f57b08f907abd9b28",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            },
            {
              "lessThan": "e38585401d464578d30f5868ff4ca54475c34f7d",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            },
            {
              "lessThan": "38296afe3c6ee07319e01bb249aa4bb47c07b534",
              "status": "affected",
              "version": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/nilfs2/file.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.9"
            },
            {
              "lessThan": "3.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.307",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.269",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.210",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.149",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.79",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.18",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.7.*",
              "status": "unaffected",
              "version": "6.7.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.8",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()\n\nSyzbot reported a hang issue in migrate_pages_batch() called by mbind()\nand nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.\n\nWhile migrate_pages_batch() locks a folio and waits for the writeback to\ncomplete, the log writer thread that should bring the writeback to\ncompletion picks up the folio being written back in\nnilfs_lookup_dirty_data_buffers() that it calls for subsequent log\ncreation and was trying to lock the folio.  Thus causing a deadlock.\n\nIn the first place, it is unexpected that folios/pages in the middle of\nwriteback will be updated and become dirty.  Nilfs2 adds a checksum to\nverify the validity of the log being written and uses it for recovery at\nmount, so data changes during writeback are suppressed.  Since this is\nbroken, an unclean shutdown could potentially cause recovery to fail.\n\nInvestigation revealed that the root cause is that the wait for writeback\ncompletion in nilfs_page_mkwrite() is conditional, and if the backing\ndevice does not require stable writes, data may be modified without\nwaiting.\n\nFix these issues by making nilfs_page_mkwrite() wait for writeback to\nfinish regardless of the stable write requirement of the backing device."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T08:45:22.210Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e"
        },
        {
          "url": "https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46"
        },
        {
          "url": "https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6"
        },
        {
          "url": "https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f"
        },
        {
          "url": "https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32"
        },
        {
          "url": "https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28"
        },
        {
          "url": "https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d"
        },
        {
          "url": "https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534"
        }
      ],
      "title": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-26696",
    "datePublished": "2024-04-03T14:54:56.926Z",
    "dateReserved": "2024-02-19T14:20:24.156Z",
    "dateUpdated": "2024-12-19T08:45:22.210Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-26696\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-03T15:15:52.830\",\"lastModified\":\"2024-11-21T09:02:51.970\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()\\n\\nSyzbot reported a hang issue in migrate_pages_batch() called by mbind()\\nand nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.\\n\\nWhile migrate_pages_batch() locks a folio and waits for the writeback to\\ncomplete, the log writer thread that should bring the writeback to\\ncompletion picks up the folio being written back in\\nnilfs_lookup_dirty_data_buffers() that it calls for subsequent log\\ncreation and was trying to lock the folio.  Thus causing a deadlock.\\n\\nIn the first place, it is unexpected that folios/pages in the middle of\\nwriteback will be updated and become dirty.  Nilfs2 adds a checksum to\\nverify the validity of the log being written and uses it for recovery at\\nmount, so data changes during writeback are suppressed.  Since this is\\nbroken, an unclean shutdown could potentially cause recovery to fail.\\n\\nInvestigation revealed that the root cause is that the wait for writeback\\ncompletion in nilfs_page_mkwrite() is conditional, and if the backing\\ndevice does not require stable writes, data may be modified without\\nwaiting.\\n\\nFix these issues by making nilfs_page_mkwrite() wait for writeback to\\nfinish regardless of the stable write requirement of the backing device.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nilfs2: corrige un bloqueo en nilfs_lookup_dirty_data_buffers() Syzbot inform\u00f3 un problema de bloqueo en migrar_pages_batch() llamado por mbind() y nilfs_lookup_dirty_data_buffers() llamado en el escritor de registros de nilfs2. Mientras migrar_pages_batch() bloquea una publicaci\u00f3n y espera a que se complete la reescritura, el subproceso del escritor de registros que deber\u00eda completar la reescritura recoge la publicaci\u00f3n que se est\u00e1 reescribiendo en nilfs_lookup_dirty_data_buffers() que solicita la creaci\u00f3n de registros posteriores y estaba intentando bloquear la fol. Provocando as\u00ed un punto muerto. En primer lugar, es inesperado que los folios/p\u00e1ginas en medio de la reescritura se actualicen y se ensucien. Nilfs2 agrega una suma de verificaci\u00f3n para verificar la validez del registro que se est\u00e1 escribiendo y la usa para la recuperaci\u00f3n en el montaje, de modo que se suprimen los cambios de datos durante la reescritura. Dado que esto no funciona, un cierre incorrecto podr\u00eda provocar que falle la recuperaci\u00f3n. La investigaci\u00f3n revel\u00f3 que la causa principal es que la espera para que se complete la reescritura en nilfs_page_mkwrite() es condicional, y si el dispositivo de respaldo no requiere escrituras estables, los datos se pueden modificar sin esperar. Solucione estos problemas haciendo que nilfs_page_mkwrite() espere a que finalice la reescritura independientemente del requisito de escritura estable del dispositivo de respaldo.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.