CVE-2024-50014

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
05/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: fix access to uninitialised lock in fc replay path<br /> <br /> The following kernel trace can be triggered with fstest generic/629 when<br /> executed against a filesystem with fast-commit feature enabled:<br /> <br /> INFO: trying to register non-static key.<br /> The code is fine but needs lockdep annotation, or maybe<br /> you didn&amp;#39;t initialize this object before use?<br /> turning off the locking correctness validator.<br /> CPU: 0 PID: 866 Comm: mount Not tainted 6.10.0+ #11<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x66/0x90<br /> register_lock_class+0x759/0x7d0<br /> __lock_acquire+0x85/0x2630<br /> ? __find_get_block+0xb4/0x380<br /> lock_acquire+0xd1/0x2d0<br /> ? __ext4_journal_get_write_access+0xd5/0x160<br /> _raw_spin_lock+0x33/0x40<br /> ? __ext4_journal_get_write_access+0xd5/0x160<br /> __ext4_journal_get_write_access+0xd5/0x160<br /> ext4_reserve_inode_write+0x61/0xb0<br /> __ext4_mark_inode_dirty+0x79/0x270<br /> ? ext4_ext_replay_set_iblocks+0x2f8/0x450<br /> ext4_ext_replay_set_iblocks+0x330/0x450<br /> ext4_fc_replay+0x14c8/0x1540<br /> ? jread+0x88/0x2e0<br /> ? rcu_is_watching+0x11/0x40<br /> do_one_pass+0x447/0xd00<br /> jbd2_journal_recover+0x139/0x1b0<br /> jbd2_journal_load+0x96/0x390<br /> ext4_load_and_init_journal+0x253/0xd40<br /> ext4_fill_super+0x2cc6/0x3180<br /> ...<br /> <br /> In the replay path there&amp;#39;s an attempt to lock sbi-&gt;s_bdev_wb_lock in<br /> function ext4_check_bdev_write_error(). Unfortunately, at this point this<br /> spinlock has not been initialized yet. Moving it&amp;#39;s initialization to an<br /> earlier point in __ext4_fill_super() fixes this splat.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.10.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.3 (excluding)