๐Ÿ” CVE Alert

CVE-2024-45003

UNKNOWN 0.0

vfs: Don't evict inode under the inode lru traversing context

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: vfs: Don't evict inode under the inode lru traversing context The inode reclaiming process(See function prune_icache_sb) collects all reclaimable inodes and mark them with I_FREEING flag at first, at that time, other processes will be stuck if they try getting these inodes (See function find_inode_fast), then the reclaiming process destroy the inodes by function dispose_list(). Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen. Case 1: In function ext4_evict_inode(), the ea inode lookup could happen if ea_inode feature is enabled, the lookup process will be stuck under the evicting context like this: 1. File A has inode i_reg and an ea inode i_ea 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru->i_ea 3. Then, following three processes running like this: PA PB echo 2 > /proc/sys/vm/drop_caches shrink_slab prune_dcache_sb // i_reg is added into lru, lru->i_ea->i_reg prune_icache_sb list_lru_walk_one inode_lru_isolate i_ea->i_state |= I_FREEING // set inode state inode_lru_isolate __iget(i_reg) spin_unlock(&i_reg->i_lock) spin_unlock(lru_lock) rm file A i_reg->nlink = 0 iput(i_reg) // i_reg->nlink is 0, do evict ext4_evict_inode ext4_xattr_delete_inode ext4_xattr_inode_dec_ref_all ext4_xattr_inode_iget ext4_iget(i_ea->i_ino) iget_locked find_inode_fast __wait_on_freeing_inode(i_ea) ----โ†’ AA deadlock dispose_list // cannot be executed by prune_icache_sb wake_up_bit(&i_ea->i_state) Case 2: In deleted inode writing function ubifs_jnl_write_inode(), file deleting process holds BASEHD's wbuf->io_mutex while getting the xattr inode, which could race with inode reclaiming process(The reclaiming process could try locking BASEHD's wbuf->io_mutex in inode evicting function), then an ABBA deadlock problem would happen as following: 1. File A has inode ia and a xattr(with inode ixa), regular file B has inode ib and a xattr. 2. getfattr(A, xattr_buf) // ixa is added into lru // lru->ixa 3. Then, following three processes running like this: PA PB PC echo 2 > /proc/sys/vm/drop_caches shrink_slab prune_dcache_sb // ib and ia are added into lru, lru->ixa->ib->ia prune_icache_sb list_lru_walk_one inode_lru_isolate ixa->i_state |= I_FREEING // set inode state inode_lru_isolate __iget(ib) spin_unlock(&ib->i_lock) spin_unlock(lru_lock) rm file B ib->nlink = 0 rm file A iput(ia) ubifs_evict_inode(ia) ubifs_jnl_delete_inode(ia) ubifs_jnl_write_inode(ia) make_reservation(BASEHD) // Lock wbuf->io_mutex ubifs_iget(ixa->i_ino) iget_locked find_inode_fast __wait_on_freeing_inode(ixa) | iput(ib) // ib->nlink is 0, do evict | ubifs_evict_inode | ubifs_jnl_delete_inode(ib) โ†“ ubifs_jnl_write_inode ABBA deadlock โ†-----make_reservation(BASEHD) dispose_list // cannot be executed by prune_icache_sb wake_up_bit(&ixa->i_state) Fix the possible deadlock by using new inode state flag I_LRU_ISOLATING to pin the inode in memory while inode_lru_isolate( ---truncated---

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e50e5129f384ae282adebfb561189cdb19b81cee < 3525ad25240dfdd8c78f3470911ed10aa727aa72 e50e5129f384ae282adebfb561189cdb19b81cee < 03880af02a78bc9a98b5a581f529cf709c88a9b8 e50e5129f384ae282adebfb561189cdb19b81cee < cda54ec82c0f9d05393242b20b13f69b083f7e88 e50e5129f384ae282adebfb561189cdb19b81cee < 437741eba63bf4e437e2beb5583f8633556a2b98 e50e5129f384ae282adebfb561189cdb19b81cee < b9bda5f6012dd00372f3a06a82ed8971a4c57c32 e50e5129f384ae282adebfb561189cdb19b81cee < 9063ab49c11e9518a3f2352434bb276cc8134c5f e50e5129f384ae282adebfb561189cdb19b81cee < 2a0629834cd82f05d424bbc193374f9a43d1f87d
Linux / Linux
4.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3525ad25240dfdd8c78f3470911ed10aa727aa72 git.kernel.org: https://git.kernel.org/stable/c/03880af02a78bc9a98b5a581f529cf709c88a9b8 git.kernel.org: https://git.kernel.org/stable/c/cda54ec82c0f9d05393242b20b13f69b083f7e88 git.kernel.org: https://git.kernel.org/stable/c/437741eba63bf4e437e2beb5583f8633556a2b98 git.kernel.org: https://git.kernel.org/stable/c/b9bda5f6012dd00372f3a06a82ed8971a4c57c32 git.kernel.org: https://git.kernel.org/stable/c/9063ab49c11e9518a3f2352434bb276cc8134c5f git.kernel.org: https://git.kernel.org/stable/c/2a0629834cd82f05d424bbc193374f9a43d1f87d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html