CVE-2024-26696

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() Syzbot reported a hang issue in migrate_pages_batch() called by mbind() and nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2. While migrate_pages_batch() locks a folio and waits for the writeback to complete, the log writer thread that should bring the writeback to completion picks up the folio being written back in nilfs_lookup_dirty_data_buffers() that it calls for subsequent log creation and was trying to lock the folio. Thus causing a deadlock. In the first place, it is unexpected that folios/pages in the middle of writeback will be updated and become dirty. Nilfs2 adds a checksum to verify the validity of the log being written and uses it for recovery at mount, so data changes during writeback are suppressed. Since this is broken, an unclean shutdown could potentially cause recovery to fail. Investigation revealed that the root cause is that the wait for writeback completion in nilfs_page_mkwrite() is conditional, and if the backing device does not require stable writes, data may be modified without waiting. Fix these issues by making nilfs_page_mkwrite() wait for writeback to finish regardless of the stable write requirement of the backing device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Mar 2025, 15:37

Type Values Removed Values Added
CWE CWE-667
First Time Debian
Linux linux Kernel
Linux
Debian debian Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e - () https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e - Patch
References () https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534 - () https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534 - Patch
References () https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f - () https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f - Patch
References () https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32 - () https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32 - Patch
References () https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46 - () https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46 - Patch
References () https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6 - () https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6 - Patch
References () https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d - () https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d - Patch
References () https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28 - () https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

21 Nov 2024, 09:02

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e - () https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e -
References () https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534 - () https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534 -
References () https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f - () https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f -
References () https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32 - () https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32 -
References () https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46 - () https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46 -
References () https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6 - () https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6 -
References () https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d - () https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d -
References () https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28 - () https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28 -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: nilfs2: corrige un bloqueo en nilfs_lookup_dirty_data_buffers() Syzbot informó un problema de bloqueo en migrar_pages_batch() llamado por mbind() y nilfs_lookup_dirty_data_buffers() llamado en el escritor de registros de nilfs2. Mientras migrar_pages_batch() bloquea una publicación y espera a que se complete la reescritura, el subproceso del escritor de registros que debería completar la reescritura recoge la publicación que se está reescribiendo en nilfs_lookup_dirty_data_buffers() que solicita la creación de registros posteriores y estaba intentando bloquear la fol. Provocando así un punto muerto. En primer lugar, es inesperado que los folios/páginas en medio de la reescritura se actualicen y se ensucien. Nilfs2 agrega una suma de verificación para verificar la validez del registro que se está escribiendo y la usa para la recuperación en el montaje, de modo que se suprimen los cambios de datos durante la reescritura. Dado que esto no funciona, un cierre incorrecto podría provocar que falle la recuperación. La investigación reveló que la causa principal es que la espera para que se complete la reescritura en nilfs_page_mkwrite() es condicional, y si el dispositivo de respaldo no requiere escrituras estables, los datos se pueden modificar sin esperar. Solucione estos problemas haciendo que nilfs_page_mkwrite() espere a que finalice la reescritura independientemente del requisito de escritura estable del dispositivo de respaldo.

03 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 15:15

Updated : 2025-03-17 15:37


NVD link : CVE-2024-26696

Mitre link : CVE-2024-26696

CVE.ORG link : CVE-2024-26696


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking