CVE-2024-40943
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
12/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ocfs2: fix races between hole punching and AIO+DIO<br />
<br />
After commit "ocfs2: return real error code in ocfs2_dio_wr_get_block",<br />
fstests/generic/300 become from always failed to sometimes failed:<br />
<br />
========================================================================<br />
[ 473.293420 ] run fstests generic/300<br />
<br />
[ 475.296983 ] JBD2: Ignoring recovery information on journal<br />
[ 475.302473 ] ocfs2: Mounting device (253,1) on (node local, slot 0) with ordered data mode.<br />
[ 494.290998 ] OCFS2: ERROR (device dm-1): ocfs2_change_extent_flag: Owner 5668 has an extent at cpos 78723 which can no longer be found<br />
[ 494.291609 ] On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted.<br />
[ 494.292018 ] OCFS2: File system is now read-only.<br />
[ 494.292224 ] (kworker/19:11,2628,19):ocfs2_mark_extent_written:5272 ERROR: status = -30<br />
[ 494.292602 ] (kworker/19:11,2628,19):ocfs2_dio_end_io_write:2374 ERROR: status = -3<br />
fio: io_u error on file /mnt/scratch/racer: Read-only file system: write offset=460849152, buflen=131072<br />
=========================================================================<br />
<br />
In __blockdev_direct_IO, ocfs2_dio_wr_get_block is called to add unwritten<br />
extents to a list. extents are also inserted into extent tree in<br />
ocfs2_write_begin_nolock. Then another thread call fallocate to puch a<br />
hole at one of the unwritten extent. The extent at cpos was removed by<br />
ocfs2_remove_extent(). At end io worker thread, ocfs2_search_extent_list<br />
found there is no such extent at the cpos.<br />
<br />
T1 T2 T3<br />
inode lock<br />
...<br />
insert extents<br />
...<br />
inode unlock<br />
ocfs2_fallocate<br />
__ocfs2_change_file_space<br />
inode lock<br />
lock ip_alloc_sem<br />
ocfs2_remove_inode_range inode<br />
ocfs2_remove_btree_range<br />
ocfs2_remove_extent<br />
^---remove the extent at cpos 78723<br />
...<br />
unlock ip_alloc_sem<br />
inode unlock<br />
ocfs2_dio_end_io<br />
ocfs2_dio_end_io_write<br />
lock ip_alloc_sem<br />
ocfs2_mark_extent_written<br />
ocfs2_change_extent_flag<br />
ocfs2_search_extent_list<br />
^---failed to find extent<br />
...<br />
unlock ip_alloc_sem<br />
<br />
In most filesystems, fallocate is not compatible with racing with AIO+DIO,<br />
so fix it by adding to wait for all dio before fallocate/punch_hole like<br />
ext4.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.23 (including) | 4.19.317 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.279 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.221 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/050ce8af6838c71e872e982b50d3f1bec21da40e
- https://git.kernel.org/stable/c/117b9c009b72a6c2ebfd23484354dfee2d9570d2
- https://git.kernel.org/stable/c/38825ff9da91d2854dcf6d9ac320a7e641e10f25
- https://git.kernel.org/stable/c/3c26b5d21b1239e9c7fd31ba7d9b2d7bdbaa68d9
- https://git.kernel.org/stable/c/3c361f313d696df72f9bccf058510e9ec737b9b1
- https://git.kernel.org/stable/c/952b023f06a24b2ad6ba67304c4c84d45bea2f18
- https://git.kernel.org/stable/c/e8e2db1adac47970a6a9225f3858e9aa0e86287f
- https://git.kernel.org/stable/c/ea042dc2bea19d72e37c298bf65a9c341ef3fff3
- https://git.kernel.org/stable/c/050ce8af6838c71e872e982b50d3f1bec21da40e
- https://git.kernel.org/stable/c/117b9c009b72a6c2ebfd23484354dfee2d9570d2
- https://git.kernel.org/stable/c/38825ff9da91d2854dcf6d9ac320a7e641e10f25
- https://git.kernel.org/stable/c/3c26b5d21b1239e9c7fd31ba7d9b2d7bdbaa68d9
- https://git.kernel.org/stable/c/3c361f313d696df72f9bccf058510e9ec737b9b1
- https://git.kernel.org/stable/c/952b023f06a24b2ad6ba67304c4c84d45bea2f18
- https://git.kernel.org/stable/c/e8e2db1adac47970a6a9225f3858e9aa0e86287f
- https://git.kernel.org/stable/c/ea042dc2bea19d72e37c298bf65a9c341ef3fff3
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



