๐Ÿ” CVE Alert

CVE-2024-47660

UNKNOWN 0.0

fsnotify: clear PARENT_WATCHED flags lazily

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily In some setups directories can have many (usually negative) dentries. Hence __fsnotify_update_child_dentry_flags() function can take a significant amount of time. Since the bulk of this function happens under inode->i_lock this causes a significant contention on the lock when we remove the watch from the directory as the __fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask() races with __fsnotify_update_child_dentry_flags() calls from __fsnotify_parent() happening on children. This can lead upto softlockup reports reported by users. Fix the problem by calling fsnotify_update_children_dentry_flags() to set PARENT_WATCHED flags only when parent starts watching children. When parent stops watching children, clear false positive PARENT_WATCHED flags lazily in __fsnotify_parent() for each accessed child.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 9, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
873feea09ebc980cbd3631b767356ce1eee65ec1 < 3f3ef1d9f66b93913ce2171120d9226b55acd41d 873feea09ebc980cbd3631b767356ce1eee65ec1 < f9a48bc3dd9099935751458a5bbbea4b7c28abc8 873feea09ebc980cbd3631b767356ce1eee65ec1 < d8c42405fc3507cc43ba7e4986a773c3fc633f6e 873feea09ebc980cbd3631b767356ce1eee65ec1 < fc1b1e135c3f72382f792e6c319fc088d5523ad5 873feea09ebc980cbd3631b767356ce1eee65ec1 < 7ef1d2e240c32b1f337a37232d037b07e3919e1a 873feea09ebc980cbd3631b767356ce1eee65ec1 < 172e422ffea20a89bfdc672741c1aad6fbb5044e
Linux / Linux
2.6.38

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3f3ef1d9f66b93913ce2171120d9226b55acd41d git.kernel.org: https://git.kernel.org/stable/c/f9a48bc3dd9099935751458a5bbbea4b7c28abc8 git.kernel.org: https://git.kernel.org/stable/c/d8c42405fc3507cc43ba7e4986a773c3fc633f6e git.kernel.org: https://git.kernel.org/stable/c/fc1b1e135c3f72382f792e6c319fc088d5523ad5 git.kernel.org: https://git.kernel.org/stable/c/7ef1d2e240c32b1f337a37232d037b07e3919e1a git.kernel.org: https://git.kernel.org/stable/c/172e422ffea20a89bfdc672741c1aad6fbb5044e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html