CVE-2024-35794
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/05/2024
Last modified:
26/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dm-raid: really frozen sync_thread during suspend<br />
<br />
1) commit f52f5c71f3d4 ("md: fix stopping sync thread") remove<br />
MD_RECOVERY_FROZEN from __md_stop_writes() and doesn&#39;t realize that<br />
dm-raid relies on __md_stop_writes() to frozen sync_thread<br />
indirectly. Fix this problem by adding MD_RECOVERY_FROZEN in<br />
md_stop_writes(), and since stop_sync_thread() is only used for<br />
dm-raid in this case, also move stop_sync_thread() to<br />
md_stop_writes().<br />
2) The flag MD_RECOVERY_FROZEN doesn&#39;t mean that sync thread is frozen,<br />
it only prevent new sync_thread to start, and it can&#39;t stop the<br />
running sync thread; In order to frozen sync_thread, after seting the<br />
flag, stop_sync_thread() should be used.<br />
3) The flag MD_RECOVERY_FROZEN doesn&#39;t mean that writes are stopped, use<br />
it as condition for md_stop_writes() in raid_postsuspend() doesn&#39;t<br />
look correct. Consider that reentrant stop_sync_thread() do nothing,<br />
always call md_stop_writes() in raid_postsuspend().<br />
4) raid_message can set/clear the flag MD_RECOVERY_FROZEN at anytime,<br />
and if MD_RECOVERY_FROZEN is cleared while the array is suspended,<br />
new sync_thread can start unexpected. Fix this by disallow<br />
raid_message() to change sync_thread status during suspend.<br />
<br />
Note that after commit f52f5c71f3d4 ("md: fix stopping sync thread"), the<br />
test shell/lvconvert-raid-reshape.sh start to hang in stop_sync_thread(),<br />
and with previous fixes, the test won&#39;t hang there anymore, however, the<br />
test will still fail and complain that ext4 is corrupted. And with this<br />
patch, the test won&#39;t hang due to stop_sync_thread() or fail due to ext4<br />
is corrupted anymore. However, there is still a deadlock related to<br />
dm-raid456 that will be fixed in following patches.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8 (including) | 6.7.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/16c4770c75b1223998adbeb7286f9a15c65fba73
- https://git.kernel.org/stable/c/af916cb66a80597f3523bc85812e790bcdcfd62b
- https://git.kernel.org/stable/c/eaa8fc9b092837cf2c754bde1a15d784ce9a85ab
- https://git.kernel.org/stable/c/16c4770c75b1223998adbeb7286f9a15c65fba73
- https://git.kernel.org/stable/c/af916cb66a80597f3523bc85812e790bcdcfd62b
- https://git.kernel.org/stable/c/eaa8fc9b092837cf2c754bde1a15d784ce9a85ab



