CVE-2024-53112
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ocfs2: uncache inode which has failed entering the group<br />
<br />
Syzbot has reported the following BUG:<br />
<br />
kernel BUG at fs/ocfs2/uptodate.c:509!<br />
...<br />
Call Trace:<br />
<br />
? __die_body+0x5f/0xb0<br />
? die+0x9e/0xc0<br />
? do_trap+0x15a/0x3a0<br />
? ocfs2_set_new_buffer_uptodate+0x145/0x160<br />
? do_error_trap+0x1dc/0x2c0<br />
? ocfs2_set_new_buffer_uptodate+0x145/0x160<br />
? __pfx_do_error_trap+0x10/0x10<br />
? handle_invalid_op+0x34/0x40<br />
? ocfs2_set_new_buffer_uptodate+0x145/0x160<br />
? exc_invalid_op+0x38/0x50<br />
? asm_exc_invalid_op+0x1a/0x20<br />
? ocfs2_set_new_buffer_uptodate+0x2e/0x160<br />
? ocfs2_set_new_buffer_uptodate+0x144/0x160<br />
? ocfs2_set_new_buffer_uptodate+0x145/0x160<br />
ocfs2_group_add+0x39f/0x15a0<br />
? __pfx_ocfs2_group_add+0x10/0x10<br />
? __pfx_lock_acquire+0x10/0x10<br />
? mnt_get_write_access+0x68/0x2b0<br />
? __pfx_lock_release+0x10/0x10<br />
? rcu_read_lock_any_held+0xb7/0x160<br />
? __pfx_rcu_read_lock_any_held+0x10/0x10<br />
? smack_log+0x123/0x540<br />
? mnt_get_write_access+0x68/0x2b0<br />
? mnt_get_write_access+0x68/0x2b0<br />
? mnt_get_write_access+0x226/0x2b0<br />
ocfs2_ioctl+0x65e/0x7d0<br />
? __pfx_ocfs2_ioctl+0x10/0x10<br />
? smack_file_ioctl+0x29e/0x3a0<br />
? __pfx_smack_file_ioctl+0x10/0x10<br />
? lockdep_hardirqs_on_prepare+0x43d/0x780<br />
? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10<br />
? __pfx_ocfs2_ioctl+0x10/0x10<br />
__se_sys_ioctl+0xfb/0x170<br />
do_syscall_64+0xf3/0x230<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
...<br />
<br />
<br />
When &#39;ioctl(OCFS2_IOC_GROUP_ADD, ...)&#39; has failed for the particular<br />
inode in &#39;ocfs2_verify_group_and_input()&#39;, corresponding buffer head<br />
remains cached and subsequent call to the same &#39;ioctl()&#39; for the same<br />
inode issues the BUG() in &#39;ocfs2_set_new_buffer_uptodate()&#39; (trying<br />
to cache the same buffer head of that inode). Fix this by uncaching<br />
the buffer head with &#39;ocfs2_remove_from_cache()&#39; on error path in<br />
&#39;ocfs2_group_add()&#39;.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.25 (including) | 4.19.325 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 6.1.119 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.63 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0e04746db2ec4aec04cef5763b9d9aa32829ae2f
- https://git.kernel.org/stable/c/28d4ed71ae0b4baedca3e85ee6d8f227ec75ebf6
- https://git.kernel.org/stable/c/5ae8cc0b0c027e9cab22596049bc4dd1cbc37ee4
- https://git.kernel.org/stable/c/620d22598110b0d0cb97a3fcca65fc473ea86e73
- https://git.kernel.org/stable/c/737f34137844d6572ab7d473c998c7f977ff30eb
- https://git.kernel.org/stable/c/843dfc804af4b338ead42331dd58081b428ecdf8
- https://git.kernel.org/stable/c/ac0cfe8ac35cf1be54131b90d114087b558777ca
- https://git.kernel.org/stable/c/b751c50e19d66cfb7360c0b55cf17b0722252d12
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



