CVE-2024-50014
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
05/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ext4: fix access to uninitialised lock in fc replay path<br />
<br />
The following kernel trace can be triggered with fstest generic/629 when<br />
executed against a filesystem with fast-commit feature enabled:<br />
<br />
INFO: trying to register non-static key.<br />
The code is fine but needs lockdep annotation, or maybe<br />
you didn&#39;t initialize this object before use?<br />
turning off the locking correctness validator.<br />
CPU: 0 PID: 866 Comm: mount Not tainted 6.10.0+ #11<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x66/0x90<br />
register_lock_class+0x759/0x7d0<br />
__lock_acquire+0x85/0x2630<br />
? __find_get_block+0xb4/0x380<br />
lock_acquire+0xd1/0x2d0<br />
? __ext4_journal_get_write_access+0xd5/0x160<br />
_raw_spin_lock+0x33/0x40<br />
? __ext4_journal_get_write_access+0xd5/0x160<br />
__ext4_journal_get_write_access+0xd5/0x160<br />
ext4_reserve_inode_write+0x61/0xb0<br />
__ext4_mark_inode_dirty+0x79/0x270<br />
? ext4_ext_replay_set_iblocks+0x2f8/0x450<br />
ext4_ext_replay_set_iblocks+0x330/0x450<br />
ext4_fc_replay+0x14c8/0x1540<br />
? jread+0x88/0x2e0<br />
? rcu_is_watching+0x11/0x40<br />
do_one_pass+0x447/0xd00<br />
jbd2_journal_recover+0x139/0x1b0<br />
jbd2_journal_load+0x96/0x390<br />
ext4_load_and_init_journal+0x253/0xd40<br />
ext4_fill_super+0x2cc6/0x3180<br />
...<br />
<br />
In the replay path there&#39;s an attempt to lock sbi->s_bdev_wb_lock in<br />
function ext4_check_bdev_write_error(). Unfortunately, at this point this<br />
spinlock has not been initialized yet. Moving it&#39;s initialization to an<br />
earlier point in __ext4_fill_super() fixes this splat.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10.14 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/23dfdb56581ad92a9967bcd720c8c23356af74c1
- https://git.kernel.org/stable/c/6e35f560daebe40264c95e9a1ab03110d4997df6
- https://git.kernel.org/stable/c/b002031d585a14eed511117dda8c6452a804d508
- https://git.kernel.org/stable/c/d157fc20ca5239fd56965a5a8aa1a0e25919891a
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



