CVE-2024-53052
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write<br />
<br />
When io_uring starts a write, it&#39;ll call kiocb_start_write() to bump the<br />
super block rwsem, preventing any freezes from happening while that<br />
write is in-flight. The freeze side will grab that rwsem for writing,<br />
excluding any new writers from happening and waiting for existing writes<br />
to finish. But io_uring unconditionally uses kiocb_start_write(), which<br />
will block if someone is currently attempting to freeze the mount point.<br />
This causes a deadlock where freeze is waiting for previous writes to<br />
complete, but the previous writes cannot complete, as the task that is<br />
supposed to complete them is blocked waiting on starting a new write.<br />
This results in the following stuck trace showing that dependency with<br />
the write blocked starting a new write:<br />
<br />
task:fio state:D stack:0 pid:886 tgid:886 ppid:876<br />
Call trace:<br />
__switch_to+0x1d8/0x348<br />
__schedule+0x8e8/0x2248<br />
schedule+0x110/0x3f0<br />
percpu_rwsem_wait+0x1e8/0x3f8<br />
__percpu_down_read+0xe8/0x500<br />
io_write+0xbb8/0xff8<br />
io_issue_sqe+0x10c/0x1020<br />
io_submit_sqes+0x614/0x2110<br />
__arm64_sys_io_uring_enter+0x524/0x1038<br />
invoke_syscall+0x74/0x268<br />
el0_svc_common.constprop.0+0x160/0x238<br />
do_el0_svc+0x44/0x60<br />
el0_svc+0x44/0xb0<br />
el0t_64_sync_handler+0x118/0x128<br />
el0t_64_sync+0x168/0x170<br />
INFO: task fsfreeze:7364 blocked for more than 15 seconds.<br />
Not tainted 6.12.0-rc5-00063-g76aaf945701c #7963<br />
<br />
with the attempting freezer stuck trying to grab the rwsem:<br />
<br />
task:fsfreeze state:D stack:0 pid:7364 tgid:7364 ppid:995<br />
Call trace:<br />
__switch_to+0x1d8/0x348<br />
__schedule+0x8e8/0x2248<br />
schedule+0x110/0x3f0<br />
percpu_down_write+0x2b0/0x680<br />
freeze_super+0x248/0x8a8<br />
do_vfs_ioctl+0x149c/0x1b18<br />
__arm64_sys_ioctl+0xd0/0x1a0<br />
invoke_syscall+0x74/0x268<br />
el0_svc_common.constprop.0+0x160/0x238<br />
do_el0_svc+0x44/0x60<br />
el0_svc+0x44/0xb0<br />
el0t_64_sync_handler+0x118/0x128<br />
el0t_64_sync+0x168/0x170<br />
<br />
Fix this by having the io_uring side honor IOCB_NOWAIT, and only attempt a<br />
blocking grab of the super block rwsem if it isn&#39;t set. For normal issue<br />
where IOCB_NOWAIT would always be set, this returns -EAGAIN which will<br />
have io_uring core issue a blocking attempt of the write. That will in<br />
turn also get completions run, ensuring forward progress.<br />
<br />
Since freezing requires CAP_SYS_ADMIN in the first place, this isn&#39;t<br />
something that can be triggered by a regular user.
Impact
Base Score 3.x
4.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.230 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.172 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.116 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.60 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/003d2996964c03dfd34860500428f4cdf1f5879e
- https://git.kernel.org/stable/c/1d60d74e852647255bd8e76f5a22dc42531e4389
- https://git.kernel.org/stable/c/26b8c48f369b7591f5679e0b90612f4862a32929
- https://git.kernel.org/stable/c/485d9232112b17f389b29497ff41b97b3189546b
- https://git.kernel.org/stable/c/4e24041ba86d50aaa4c792ae2c88ed01b3d96243
- https://git.kernel.org/stable/c/9e8debb8e51354b201db494689198078ec2c1e75
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



