CVE-2024-26869

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to truncate meta inode pages forcely Below race case can cause data corruption: Thread A GC thread - gc_data_segment - ra_data_block - locked meta_inode page - f2fs_inplace_write_data - invalidate_mapping_pages : fail to invalidate meta_inode page due to lock failure or dirty|writeback status - f2fs_submit_page_bio : write last dirty data to old blkaddr - move_data_block - load old data from meta_inode page - f2fs_submit_page_write : write old data to new blkaddr Because invalidate_mapping_pages() will skip invalidating page which has unclear status including locked, dirty, writeback and so on, so we need to use truncate_inode_pages_range() instead of invalidate_mapping_pages() to make sure meta_inode page will be dropped.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 May 2025, 17:39

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
References () https://git.kernel.org/stable/c/04226d8e3c4028dc451e9d8777356ec0f7919253 - () https://git.kernel.org/stable/c/04226d8e3c4028dc451e9d8777356ec0f7919253 - Patch
References () https://git.kernel.org/stable/c/77bfdb89cc222fc7bfe198eda77bdc427d5ac189 - () https://git.kernel.org/stable/c/77bfdb89cc222fc7bfe198eda77bdc427d5ac189 - Patch
References () https://git.kernel.org/stable/c/9f0c4a46be1fe9b97dbe66d49204c1371e3ece65 - () https://git.kernel.org/stable/c/9f0c4a46be1fe9b97dbe66d49204c1371e3ece65 - Patch
References () https://git.kernel.org/stable/c/c92f2927df860a60ba815d3ee610a944b92a8694 - () https://git.kernel.org/stable/c/c92f2927df860a60ba815d3ee610a944b92a8694 - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/04226d8e3c4028dc451e9d8777356ec0f7919253 - () https://git.kernel.org/stable/c/04226d8e3c4028dc451e9d8777356ec0f7919253 -
References () https://git.kernel.org/stable/c/77bfdb89cc222fc7bfe198eda77bdc427d5ac189 - () https://git.kernel.org/stable/c/77bfdb89cc222fc7bfe198eda77bdc427d5ac189 -
References () https://git.kernel.org/stable/c/9f0c4a46be1fe9b97dbe66d49204c1371e3ece65 - () https://git.kernel.org/stable/c/9f0c4a46be1fe9b97dbe66d49204c1371e3ece65 -
References () https://git.kernel.org/stable/c/c92f2927df860a60ba815d3ee610a944b92a8694 - () https://git.kernel.org/stable/c/c92f2927df860a60ba815d3ee610a944b92a8694 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: corrección para truncar las páginas de meta-inodo a la fuerza El siguiente caso de carrera puede causar corrupción de datos: Hilo Un hilo de GC - gc_data_segment - ra_data_block - página de meta_inodo bloqueada - f2fs_inplace_write_data - invalidate_mapping_pages: no se puede invalidar meta_inode página debido a falla de bloqueo o estado sucio|reescritura - f2fs_submit_page_bio: escribe los últimos datos sucios en el blkaddr antiguo - move_data_block - carga datos antiguos de la página meta_inode - f2fs_submit_page_write: escribe datos antiguos en el blkaddr nuevo Porque invalidate_mapping_pages() omitirá la página de invalidación cuyo estado no está claro incluyendo bloqueado, sucio, reescritura, etc., por lo que debemos usar truncate_inode_pages_range() en lugar de invalidate_mapping_pages() para asegurarnos de que la página meta_inode se elimine.

17 Apr 2024, 12:48

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 11:15

Updated : 2025-05-07 17:39


NVD link : CVE-2024-26869

Mitre link : CVE-2024-26869

CVE.ORG link : CVE-2024-26869


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')