CVE-2024-49867

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
21/10/2024
Last modified:
08/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: wait for fixup workers before stopping cleaner kthread during umount<br /> <br /> During unmount, at close_ctree(), we have the following steps in this order:<br /> <br /> 1) Park the cleaner kthread - this doesn&amp;#39;t destroy the kthread, it basically<br /> halts its execution (wake ups against it work but do nothing);<br /> <br /> 2) We stop the cleaner kthread - this results in freeing the respective<br /> struct task_struct;<br /> <br /> 3) We call btrfs_stop_all_workers() which waits for any jobs running in all<br /> the work queues and then free the work queues.<br /> <br /> Syzbot reported a case where a fixup worker resulted in a crash when doing<br /> a delayed iput on its inode while attempting to wake up the cleaner at<br /> btrfs_add_delayed_iput(), because the task_struct of the cleaner kthread<br /> was already freed. This can happen during unmount because we don&amp;#39;t wait<br /> for any fixup workers still running before we call kthread_stop() against<br /> the cleaner kthread, which stops and free all its resources.<br /> <br /> Fix this by waiting for any fixup workers at close_ctree() before we call<br /> kthread_stop() against the cleaner and run pending delayed iputs.<br /> <br /> The stack traces reported by syzbot were the following:<br /> <br /> BUG: KASAN: slab-use-after-free in __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065<br /> Read of size 8 at addr ffff8880272a8a18 by task kworker/u8:3/52<br /> <br /> CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.12.0-rc1-syzkaller #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024<br /> Workqueue: btrfs-fixup btrfs_work_helper<br /> Call Trace:<br /> <br /> __dump_stack lib/dump_stack.c:94 [inline]<br /> dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120<br /> print_address_description mm/kasan/report.c:377 [inline]<br /> print_report+0x169/0x550 mm/kasan/report.c:488<br /> kasan_report+0x143/0x180 mm/kasan/report.c:601<br /> __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065<br /> lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825<br /> __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]<br /> _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162<br /> class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]<br /> try_to_wake_up+0xb0/0x1480 kernel/sched/core.c:4154<br /> btrfs_writepage_fixup_worker+0xc16/0xdf0 fs/btrfs/inode.c:2842<br /> btrfs_work_helper+0x390/0xc50 fs/btrfs/async-thread.c:314<br /> process_one_work kernel/workqueue.c:3229 [inline]<br /> process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310<br /> worker_thread+0x870/0xd30 kernel/workqueue.c:3391<br /> kthread+0x2f0/0x390 kernel/kthread.c:389<br /> ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147<br /> ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244<br /> <br /> <br /> Allocated by task 2:<br /> kasan_save_stack mm/kasan/common.c:47 [inline]<br /> kasan_save_track+0x3f/0x80 mm/kasan/common.c:68<br /> unpoison_slab_object mm/kasan/common.c:319 [inline]<br /> __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345<br /> kasan_slab_alloc include/linux/kasan.h:247 [inline]<br /> slab_post_alloc_hook mm/slub.c:4086 [inline]<br /> slab_alloc_node mm/slub.c:4135 [inline]<br /> kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4187<br /> alloc_task_struct_node kernel/fork.c:180 [inline]<br /> dup_task_struct+0x57/0x8c0 kernel/fork.c:1107<br /> copy_process+0x5d1/0x3d50 kernel/fork.c:2206<br /> kernel_clone+0x223/0x880 kernel/fork.c:2787<br /> kernel_thread+0x1bc/0x240 kernel/fork.c:2849<br /> create_kthread kernel/kthread.c:412 [inline]<br /> kthreadd+0x60d/0x810 kernel/kthread.c:765<br /> ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147<br /> ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244<br /> <br /> Freed by task 61:<br /> kasan_save_stack mm/kasan/common.c:47 [inline]<br /> kasan_save_track+0x3f/0x80 mm/kasan/common.c:68<br /> kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579<br /> poison_slab_object mm/kasan/common.c:247 [inline]<br /> __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264<br /> kasan_slab_free include/linux/kasan.h:230 [inline]<br /> slab_free_h<br /> ---truncated---

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.227 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.55 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.3 (excluding)