In the Linux kernel, the following vulnerability has been resolved: nilfs2:
fix hang in nilfs_lookup_dirty_data_buffers() Syzbot reported a hang issue
in migrate_pages_batch() called by mbind() and
nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2. While
migrate_pages_batch() locks a folio and waits for the writeback to
complete, the log writer thread that should bring the writeback to
completion picks up the folio being written back in
nilfs_lookup_dirty_data_buffers() that it calls for subsequent log creation
and was trying to lock the folio. Thus causing a deadlock. In the first
place, it is unexpected that folios/pages in the middle of writeback will
be updated and become dirty. Nilfs2 adds a checksum to verify the validity
of the log being written and uses it for recovery at mount, so data changes
during writeback are suppressed. Since this is broken, an unclean shutdown
could potentially cause recovery to fail. Investigation revealed that the
root cause is that the wait for writeback completion in
nilfs_page_mkwrite() is conditional, and if the backing device does not
require stable writes, data may be modified without waiting. Fix these
issues by making nilfs_page_mkwrite() wait for writeback to finish
regardless of the stable write requirement of the backing device.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-181.201 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-106.116 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-44.44 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1124.134 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1061.67 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1061.67~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1124.134~18.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < 6.5.0-1023.23~22.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1129.136 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1063.72 | UNKNOWN |
git.kernel.org/linus/38296afe3c6ee07319e01bb249aa4bb47c07b534 (6.8-rc4)
git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e
git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534
git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f
git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32
git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46
git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6
git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d
git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28
launchpad.net/bugs/cve/CVE-2024-26696
nvd.nist.gov/vuln/detail/CVE-2024-26696
security-tracker.debian.org/tracker/CVE-2024-26696
ubuntu.com/security/notices/USN-6766-1
ubuntu.com/security/notices/USN-6766-2
ubuntu.com/security/notices/USN-6766-3
ubuntu.com/security/notices/USN-6767-1
ubuntu.com/security/notices/USN-6767-2
ubuntu.com/security/notices/USN-6795-1
ubuntu.com/security/notices/USN-6828-1
ubuntu.com/security/notices/USN-6895-1
ubuntu.com/security/notices/USN-6895-2
ubuntu.com/security/notices/USN-6895-3
ubuntu.com/security/notices/USN-6900-1
www.cve.org/CVERecord?id=CVE-2024-26696